Sciweavers

1477 search results - page 168 / 296
» Token flow control
Sort
View
CEAS
2004
Springer
14 years 1 months ago
Managing Customer Opt-Outs in a Complex Global Environment
The day to day rhetoric associated with spam control focuses on measures, technology, rules or fees to impose order or control. These efforts concentrate on the broad range of mess...
Matt Leonard, Mayra Rodriguez, Richard Segal, Robe...
AAAI
1996
13 years 11 months ago
Motion and Color Analysis for Animat Perception
We propose novel gaze control algorithms for active perception in mobile autonomous agents with directable, foveated vision sensors. Our agents are realistic artificial animals, o...
Tamer F. Rabie, Demetri Terzopoulos
WICOMM
2008
83views more  WICOMM 2008»
13 years 10 months ago
iPTT: peer-to-peer push-to-talk for VoIP
This paper proposes iPTT, a peer-to-peer Push-to-Talk (PTT) service for Voice over IP (VoIP). In iPTT, a distributed and mobile-operator independent network architecture is presen...
Jiun-Ren Lin, Ai-Chun Pang, Yung-Chi Wang
ICRA
2010
IEEE
137views Robotics» more  ICRA 2010»
13 years 8 months ago
Dipole-like fields for stabilization of systems with Pfaffian constraints
This paper introduces a framework that guides the design of stabilizing feedback control laws for systems with Pfaffian constraints. A new class of N-dimensional vector fields, the...
Dimitra Panagou, Herbert G. Tanner, Kostas J. Kyri...
ICCS
2001
Springer
14 years 2 months ago
The Policy Machine for Security Policy Management
Abstract. Many different access control policies and models have been developed to suit a variety of goals; these include Role-Based Access Control, One-directional Information Flo...
Vincent C. Hu, Deborah A. Frincke, David F. Ferrai...