Sciweavers

287 search results - page 19 / 58
» Being John Malkovich
Sort
View
USENIX
2003
15 years 20 days ago
Secure and Flexible Global File Sharing
Trust management credentials directly authorize actions, rather than divide the authorization task into authentication and access control. Unlike traditional credentials, which bi...
Stefan Miltchev, Vassilis Prevelakis, Sotiris Ioan...
MVA
1998
118views Computer Vision» more  MVA 1998»
15 years 20 days ago
Integrated Vision/Control System for Autonomous Planetary Rovers
Current NASA plans call for extended year-long, multikilometer treks for the 2003 and 2005 Mars missions. A much greater amount of rover autonomy is required compared to the recen...
Terry Huntsberger, Toshiro Kubota, John Rose
AAAI
1994
15 years 19 days ago
Just-In-Case Scheduling
This paper presents an algorithm, called JustIn-Case Scheduling, for building robust schedules that tend not to break. The algorithm implements the common sense idea of being prep...
Mark Drummond, John L. Bresina, Keith Swanson
USENIX
1994
15 years 19 days ago
Secure Short-Cut Routing for Mobile IP
This paper describes the architecture and implementation of a mobile IP system. It allows mobile hosts to roam between cells implemented with 2-Mbps radio base stations, while mai...
Trevor Blackwell, Kee Chan, Koling Chang, Thomas C...
GISCIENCE
2008
Springer
123views GIS» more  GISCIENCE 2008»
15 years 11 days ago
A Theory of Change for Attributed Spatial Entities
Abstract. New methods of data collection, in particular the wide range of sensors and sensor networks that are being constructed, with the ability to collect real-time data streams...
John G. Stell, Michael F. Worboys