Sciweavers

922 search results - page 54 / 185
» Controllability and Observability of Second Order Descriptor...
Sort
View
SACMAT
2006
ACM
15 years 3 months ago
Constraint generation for separation of duty
Separation of Duty (SoD) is widely recognized to be a fundamental principle in computer security. A Static SoD (SSoD) policy states that in order to have all permissions necessary...
Hong Chen, Ninghui Li
CDC
2008
IEEE
143views Control Systems» more  CDC 2008»
15 years 4 months ago
Particle filtering using multiple cross-correlations for tracking occluded objects in cluttered scenes
— This paper is concerned with the tracking of partially or entirely occluded objects in a video sequence. We propose certain modifications to the template matching approach, whi...
Arie Nakhmani, Allen Tannenbaum
JETAI
2007
141views more  JETAI 2007»
14 years 9 months ago
Exchange market for complex commodities: search for optimal matches
The Internet has led to the development of on-line markets, and computer scientists have designed various auction algorithms, as well as automated exchanges for standardized commo...
Eugene Fink, Jianli Gong, Josh Johnson
EUROSYS
2007
ACM
15 years 6 months ago
Adaptive control of virtualized resources in utility computing environments
Data centers are often under-utilized due to over-provisioning as well as time-varying resource demands of typical enterprise applications. One approach to increase resource utili...
Pradeep Padala, Kang G. Shin, Xiaoyun Zhu, Mustafa...
ROBIO
2006
IEEE
129views Robotics» more  ROBIO 2006»
15 years 3 months ago
Learning Utility Surfaces for Movement Selection
— Humanoid robots are highly redundant systems with respect to the tasks they are asked to perform. This redundancy manifests itself in the number of degrees of freedom of the ro...
Matthew Howard, Michael Gienger, Christian Goerick...