Sciweavers

304 search results - page 57 / 61
» Trusted Computing in Mobile Action
Sort
View
CEC
2010
IEEE
13 years 8 months ago
A hormone-based controller for evolutionary multi-modular robotics: From single modules to gait learning
For any embodied, mobile, autonomous agent it is essential to control its actuators appropriately for the faced task. This holds for natural organisms as well as for robots. If sev...
Heiko Hamann, Jürgen Stradner, Thomas Schmick...
DBSEC
2011
245views Database» more  DBSEC 2011»
12 years 11 months ago
Multilevel Secure Data Stream Processing
Abstract. With sensors and mobile devices becoming ubiquitous, situation monitoring applications are becoming a reality. Data Stream Management Systems (DSMSs) have been proposed t...
Raman Adaikkalavan, Indrakshi Ray, Xing Xie
ACMDIS
2000
ACM
13 years 12 months ago
PaperButtons: Expanding a Tangible User Interface
: Expanding the functionality of a successful system is always a challenge; the initial simplicity and ease-of-use is easily lost in the process. Experience indicates that this pro...
Elin Rønby Pedersen, Tomas Sokoler, Les Nel...
ECCV
1994
Springer
13 years 11 months ago
Integration and Control of Reactive Visual Processes
This paper describes a new approach to the integration and control of continuously operating visual processes. Visual processes are expressed as transformations which map signals ...
James L. Crowley, Jean Marc Bedrune, Morten Bekker...
PLDI
2010
ACM
14 years 5 months ago
Type-preserving Compilation for End-to-end Verification of Security Enforcement
A number of programming languages use rich type systems to verify security properties of code. Some of these languages are meant for source programming, but programs written in th...
Juan Chen, Ravi Chugh, Nikhil Swamy