Sciweavers

448 search results - page 22 / 90
» Who is in Control
Sort
View
ENTCS
2007
102views more  ENTCS 2007»
15 years 4 months ago
Selective Data Encryption in Outsourced Dynamic Environments
The amount of information held by organizations’ databases is increasing very quickly. A recently proposed solution to the problem of data management, which is becoming increasi...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
ISCAS
2005
IEEE
127views Hardware» more  ISCAS 2005»
15 years 9 months ago
A novel property of the second-order modes of discrete-time systems under variable transformation
Abstract— This paper derives a novel property of the secondorder modes of discrete-time systems under variable transformation. This is the generalization of the theory presented ...
Shunsuke Koshita, Masahide Abe, Masayuki Kawamata
ICAI
2008
15 years 5 months ago
Behavior-based Perceptual Navigation for Semi-Autonomous Wheelchair Operations
Abstract-- This paper describes an overview of our semiautonomous (SA) wheelchair prototype and emphasizes the design of the perceptual navigation system. The goal of our project i...
Hajime Uchiyama, Walter D. Potter
115
Voted
ICNP
2007
IEEE
15 years 10 months ago
Loss and Delay Accountability for the Internet
— The Internet provides no information on the fate of transmitted packets, and end systems cannot determine who is responsible for dropping or delaying their traffic. As a resul...
Katerina J. Argyraki, Petros Maniatis, O. Irzak, S...
CDC
2009
IEEE
136views Control Systems» more  CDC 2009»
15 years 8 months ago
Verification of K-step opacity and analysis of its complexity
In this paper, we analyze the verification of K-step opacity in discrete event systems that are modeled as (possibly non-deterministic) finite automata with partial observation on ...
Anooshiravan Saboori, Christoforos N. Hadjicostis