Sciweavers

4839 search results - page 82 / 968
» A survey of computational complexity results in systems and ...
Sort
View
ISVD
2007
IEEE
15 years 8 months ago
From the Kneser-Poulsen conjecture to ball-polyhedra via Voronoi diagrams
A very fundamental geometric problem on finite systems of spheres was independently phrased by Kneser (1955) and Poulsen (1954). According to their well-known conjecture if a fi...
Károly Bezdek
DBSEC
2008
136views Database» more  DBSEC 2008»
15 years 3 months ago
An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems
Pervasive computing applications typically involve cooperation among a number of entities spanning multiple organizations. Any security breach in any single entity can have very fa...
Indrajit Ray, Nayot Poolsappasit, Rinku Dewri
116
Voted
SACMAT
2009
ACM
15 years 8 months ago
Ensuring spatio-temporal access control for real-world applications
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decision...
Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anas...
122
Voted
GECCO
2010
Springer
249views Optimization» more  GECCO 2010»
15 years 3 months ago
Towards improved dispatching rules for complex shop floor scenarios: a genetic programming approach
Developing dispatching rules for manufacturing systems is a tedious process, which is time- and cost-consuming. Since there is no good general rule for different scenarios and ob...
Torsten Hildebrandt, Jens Heger, Bernd Scholz-Reit...
DEDS
2010
108views more  DEDS 2010»
14 years 11 months ago
Timing Control of Switched Systems with Applications to Robotic Marionettes
Abstract We present an optimal timing control formulation for the problem of controlling autonomous puppets. In particular, by appropriately timing the different movements, entire ...
Patrick Martin, Magnus Egerstedt