Sciweavers

17129 search results - page 3300 / 3426
» Applied Computing
Sort
View
139
Voted
ICTAI
2009
IEEE
15 years 9 months ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
134
Voted
IISWC
2009
IEEE
15 years 9 months ago
On the (dis)similarity of transactional memory workloads
— Programming to exploit the resources in a multicore system remains a major obstacle for both computer and software engineers. Transactional memory offers an attractive alternat...
Clay Hughes, James Poe, Amer Qouneh, Tao Li
156
Voted
IROS
2009
IEEE
138views Robotics» more  IROS 2009»
15 years 9 months ago
Using eigenposes for lossless periodic human motion imitation
— Programming a humanoid robot to perform an action that takes the robot’s complex dynamics into account is a challenging problem. Traditional approaches typically require high...
Rawichote Chalodhorn, Rajesh P. N. Rao
146
Voted
IROS
2009
IEEE
142views Robotics» more  IROS 2009»
15 years 9 months ago
Phoneme acquisition model based on vowel imitation using Recurrent Neural Network
- A phoneme-acquisition system was developed using a computational model that explains the developmental process of human infants in the early period of acquiring language. There a...
Hisashi Kanda, Tetsuya Ogata, Toru Takahashi, Kazu...
111
Voted
ISORC
2009
IEEE
15 years 9 months ago
Component Based Middleware-Synthesis for AUTOSAR Basic Software
Distributed real-time automotive embedded systems have to be highly dependable as well as cost-efficient due to the large number of manufactured units. To close the gap between r...
Dietmar Schreiner, Markus Schordan, Karl M. Gö...
« Prev « First page 3300 / 3426 Last » Next »