Sciweavers

455 search results - page 55 / 91
» Controllability and observability of uncertain systems: A ro...
Sort
View
HIPEAC
2005
Springer
15 years 6 months ago
Arc3D: A 3D Obfuscation Architecture
In DRM domain, the adversary has complete control of the computing node - supervisory privileges along with full physical as well as architectural object observational capabilities...
Mahadevan Gomathisankaran, Akhilesh Tyagi
TASE
2010
IEEE
14 years 8 months ago
Automated Selection and Placement of Single Cells Using Vision-Based Feedback Control
Abstract--We present a robotic manipulation system for automated selection and transfer of individual living cells to analysis locations. We begin with a commonly used cell transfe...
Y. H. Anis, Mark Holl, Deirdre R. Meldrum
TASLP
2010
107views more  TASLP 2010»
14 years 8 months ago
A Robust Method to Extract Talker Azimuth Orientation Using a Large-Aperture Microphone Array
Knowing the orientation of a talker in the focal area of a large-aperture microphone array enables the development of better beamforming algorithms (to obtain higher-quality speech...
Avram Levi, Harvey F. Silverman
SACMAT
2009
ACM
15 years 6 months ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
IISWC
2006
IEEE
15 years 7 months ago
Characterization of Error-Tolerant Applications when Protecting Control Data
Soft errors have become a significant concern and recent studies have measured the “architectural vulnerability factor” of systems to such errors, or conversely, the potentia...
Darshan D. Thaker, Diana Franklin, John Oliver, Su...