Sciweavers

2838 search results - page 389 / 568
» Verifying Controlled Components
Sort
View
HICSS
2008
IEEE
144views Biometrics» more  HICSS 2008»
14 years 5 months ago
Frameworks for Securing Limited-Device Applications
In this paper, we compare the features available for developing secure distributed applications for limited devices, such as smart phones. We limit our scope to examine frameworks...
Timothy E. Lindquist, Aarthi Ramamurthy, Ramon Ang...
INFOCOM
2008
IEEE
14 years 5 months ago
An Empirical Activity Model for WLAN Users
Abstract—Understanding user behavior in wireless environments is useful for a variety of reasons ranging from the design of better sleep algorithms for components of mobile devic...
Caleb T. Phillips, Suresh Singh
SASO
2008
IEEE
14 years 5 months ago
Spatial Computing with Labels
— A reconfigurable robot is a robot that can change shape. Programming reconfigurable robots is complicated by the need to adapt the behavior of each of the individual module t...
Ulrik Pagh Schultz, Mirko Bordignon, David Johan C...
CEC
2007
IEEE
14 years 5 months ago
Evolving Quadruped Gaits with a Heterogeneous Modular Robotic System
Abstract— There has been much research into the development of robotic controllers in educational, industrial and government research labs, but limited hardware budgets constrain...
Matthew D. Handier, Gregory S. Hornby
COLCOM
2007
IEEE
14 years 5 months ago
Countering feedback sparsity and manipulation in reputation systems
—Reputation systems provide a promising way for building trust through social control in collaborative communities by harnessing the community knowledge in the form of feedback. ...
Li Xiong, Ling Liu, Mustaque Ahamad