Sciweavers

448 search results - page 16 / 90
» Who is in Control
Sort
View
213
Voted
ASSISTIVE
1998
Springer
15 years 8 months ago
Wheelesley: A Robotic Wheelchair System: Indoor Navigation and User Interface
Many people who use wheelchairs are unable to control a powered wheelchair with the standard joystick interface. A robotic wheelchair can provide users with driving assistance, tak...
Holly A. Yanco
CVPR
2007
IEEE
15 years 10 months ago
Surveillance in Virtual Reality: System Design and Multi-Camera Control
This paper advocates a Virtual Vision paradigm and demonstrates its usefulness in camera sensor network research. Virtual vision prescribes the use of a visually and behaviorally ...
Faisal Qureshi, Demetri Terzopoulos
SP
2007
IEEE
183views Security Privacy» more  SP 2007»
15 years 10 months ago
Ciphertext-Policy Attribute-Based Encryption
In several distributed systems a user should only be able to access data if a user posses a certain set of credentials or attributes. Currently, the only method for enforcing such...
John Bethencourt, Amit Sahai, Brent Waters
ISW
2009
Springer
15 years 10 months ago
Hardware-Assisted Application-Level Access Control
Abstract. Applications typically rely on the operating system to enforce access control policies such as MAC, DAC, or other policies. However, in the face of a compromised operatin...
Yu-Yuan Chen, Ruby B. Lee
CDC
2008
IEEE
129views Control Systems» more  CDC 2008»
15 years 10 months ago
Distributed motion constraints for algebraic connectivity of robotic networks
— This paper studies connectivity maintenance of robotic networks that communicate at discrete times and move in continuous space. We propose a distributed algorithm that allows ...
Michael Schuresko, Jorge Cortés