Sciweavers

3979 search results - page 5 / 796
» Wild control operators
Sort
View
IROS
2009
IEEE
180views Robotics» more  IROS 2009»
14 years 1 months ago
Control of redundant robots using learned models: An operational space control approach
Abstract— We present an adaptive control approach combining forward kinematics model learning methods with the operational space control approach. This combination endows the rob...
Camille Salaün, Vincent Padois, Olivier Sigau...
SACMAT
2010
ACM
13 years 12 months ago
Towards analyzing complex operating system access control configurations
Hong Chen, Ninghui Li, Christopher S. Gates, Ziqin...
RTSS
1998
IEEE
13 years 11 months ago
Proportional Share Scheduling of Operating System Services for Real-Time Applications
Kevin Jeffay, F. Donelson Smith, A. Moorthy, James...
NSDI
2008
13 years 9 months ago
Predicted and Observed User Behavior in the Weakest-link Security Game
We aim to advance the understanding of individual security decision-making, by combining formal and behavioral analysis. We sketch a game-theoretic model of security decision-maki...
Jens Grossklags, Nicolas Christin, John Chuang
VLDB
1997
ACM
104views Database» more  VLDB 1997»
13 years 11 months ago
Integrating Reliable Memory in Databases
Abstract. Recent results in the Rio project at the University of Michigan show that it is possible to create an area of main memory that is as safe as disk from operating system cr...
Wee Teck Ng, Peter M. Chen