Sciweavers

385 search results - page 27 / 77
» constraints 1999
Sort
View
CSFW
1999
IEEE
13 years 12 months ago
Security Function Interactions
We use a compositional framework to model security architectures involving heterogeneous and distributed security functions. Our goal is to assist the ITSEC evaluation of suitabil...
Pierre Bieber
SIGCSE
1999
ACM
73views Education» more  SIGCSE 1999»
13 years 12 months ago
A student-directed computing community
We describe a computing facility created, supported, maintained, and used entirely by undergraduatestudents. This facility exists outside of the instructional support system,so th...
Adam Bonner
ICRA
1999
IEEE
87views Robotics» more  ICRA 1999»
13 years 12 months ago
Toppling Manipulation
This paper describes a robotic manipulation primitive called toppling--knocking a part over. We derive the mechanical conditions for toppling, express these as constraints on robo...
Kevin M. Lynch
INFOCOM
1999
IEEE
13 years 12 months ago
Guaranteeing Statistical QoS to Regulated Traffic: The Single Node Case
Multimedia traffic can typically tolerate some loss but has rigid delay constraints. A natural QoS requirement for a multimedia connection is a prescribed bound on the the fraction...
Martin Reisslein, Keith W. Ross, Srinivas Rajagopa...
ECMAST
1999
Springer
116views Multimedia» more  ECMAST 1999»
13 years 12 months ago
Watermarking in the MPEG-4 Context
This paper presents the constraints involved by MPEG-4 to copyright protection systems based upon watermarking technology. It proposes also an assessment methodology in order to ev...
Didier Nicholson, Panos Kudumakis, Jean-Fran&ccedi...