Sciweavers

602 search results - page 58 / 121
» An access control model for mobile physical objects
Sort
View
EVOW
2001
Springer
15 years 6 months ago
Evolution of Spiking Neural Controllers for Autonomous Vision-Based Robots
Abstract. We describe a set of preliminary experiments to evolve spiking neural controllers for a vision-based mobile robot. All the evolutionary experiments are carried out on phy...
Dario Floreano, Claudio Mattiussi
IWCMC
2006
ACM
15 years 7 months ago
A simulation study of a MAC layer protocol for wireless networks with asymmetric links
— Asymmetric links are common in wireless networks for a variety of physical, logical, operational, and legal considerations. An asymmetric link supports uni-directional communic...
Guoqiang Wang, Damla Turgut, Ladislau Böl&oum...
LCN
2003
IEEE
15 years 7 months ago
A Highly Flexible Testbed for Studies of ad-hoc Network Behaviour
Studies of mobile ad-hoc networks are often based on simulation and their underlying, necessarily simplified assumptions of physical reality. In order to analyse the practical pro...
Hartmut Ritter, Min Tian, Thiemo Voigt, Jochen H. ...
ACSW
2006
15 years 3 months ago
A method for access authorisation through delegation networks
Owners of systems and resources usually want to control who can access them. This must be based on having a process for authorising certain parties, combined with mechanisms for e...
Audun Jøsang, Dieter Gollmann, Richard Au
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
15 years 8 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee