Sciweavers

676 search results - page 104 / 136
» Ubiquitous command and control
Sort
View
EOR
2008
90views more  EOR 2008»
13 years 7 months ago
Quality of service statistics over heterogeneous networks: Analysis and applications
Heterogeneous wireless/wired networks and ubiquitous environments are gaining ever more attention by research community. To properly control and manage such puzzles a deep knowled...
Alessio Botta, Antonio Pescapè, Giorgio Ven...
JALC
2006
125views more  JALC 2006»
13 years 7 months ago
A Confinement Criterion for Securely Executing Mobile Code
Mobile programs, like applets, are not only ubiquitous, but also potentially malicious. We study the case where mobile programs are executed by a host system in a secured environm...
Hervé Grall
CORR
2010
Springer
132views Education» more  CORR 2010»
13 years 5 months ago
New Frontiers of Network Security: The Threat Within
Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends ...
Sugata Sanyal, Ajit Shelat, Amit Gupta
ICRA
2008
IEEE
160views Robotics» more  ICRA 2008»
14 years 2 months ago
A constrained optimization approach to virtual fixtures for multi-handed tasks
— In this work, we have extended the concept of constrained motion control of robots to surgical tasks that require multiple robots. We present virtual fixtures to guide the mot...
Ankur Kapoor, Russell H. Taylor
ICMI
2007
Springer
121views Biometrics» more  ICMI 2007»
14 years 1 months ago
A tactile language for intuitive human-robot communication
Abstract— This paper presents a tactile language for controlling a robot through its artificial skin. This language greatly improves the multimodal human-robot communication by ...
Andreas J. Schmid, Martin Hoffmann, Heinz Wör...