Sciweavers

3095 search results - page 574 / 619
» Ubiquitous presence systems
Sort
View
FC
2009
Springer
104views Cryptology» more  FC 2009»
14 years 3 months ago
Mitigating Inadvertent Insider Threats with Incentives
Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a mal...
Debin Liu, XiaoFeng Wang, L. Jean Camp
GLOBECOM
2008
IEEE
14 years 3 months ago
Friendly P2P: Application-Level Congestion Control for Peer-to-Peer Applications
Abstract—Peer-to-Peer (P2P) file sharing applications use multiple TCP connections between peers to transfer data. The aggressiveness and robustness of P2P technology remarkably...
YaNing Liu, Hongbo Wang, Yu Lin, Shiduan Cheng, Gw...
IROS
2008
IEEE
171views Robotics» more  IROS 2008»
14 years 3 months ago
Biomimetic grasp planning for cortical control of a robotic hand
— In this paper we outline a grasp planning system designed to augment the cortical control of a prosthetic arm and hand. A key aspect of this task is the presence of on-line use...
Matei T. Ciocarlie, Samuel T. Clanton, M. Chance S...
CISS
2007
IEEE
14 years 3 months ago
Differential Space-Frequency Group Codes for MIMO-OFDM
— In recent years, coherent space-frequency (SF) coded multiple-input multiple-output orthogonal frequency division multiplexing (MIMO-OFDM) systems have attracted great attentio...
Engin Zeydan, Ufuk Tureli
ICRA
2007
IEEE
175views Robotics» more  ICRA 2007»
14 years 3 months ago
Visual Servoing in Non-Rigid Environments: A Space-Time Approach
— Most robotic vision algorithms are proposed by envisaging robots operating in structured environments where the world is assumed to be rigid. These algorithms fail to provide o...
D. Santosh, C. V. Jawahar