Sciweavers

5339 search results - page 262 / 1068
» Controllable Delay-Insensitive Processes
Sort
View
SACMAT
2004
ACM
15 years 9 months ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste
DCOSS
2006
Springer
15 years 8 months ago
Distributed User Access Control in Sensor Networks
User access control in sensor networks defines a process of granting user the access right to the information and resources. It is essential for the future real sensor network depl...
Haodong Wang, Qun Li
RAS
2006
111views more  RAS 2006»
15 years 4 months ago
Planning under uncertainty using model predictive control for information gathering
This paper considers trajectory planning problems for autonomous robots in information gathering tasks. The objective of the planning is to maximize the information gathered withi...
Cindy Leung, Shoudong Huang, Ngai Ming Kwok, Gamin...
DAC
2006
ACM
16 years 5 months ago
Rapid estimation of control delay from high-level specifications
We address the problem of estimating controller delay from high-level specifications during behavioral synthesis. Typically, the critical path of a synthesised behavioral design g...
Gagan Raj Gupta, Madhur Gupta, Preeti Ranjan Panda
CSE
2009
IEEE
15 years 11 months ago
HACK: A Health-Based Access Control Mechanism for Dynamic Enterprise Environments
—Current access control schemes focus on the user and their rights and privileges relating to the access to both initiating functionality and accessing information. This approach...
Chenjia Wang, Kevin P. Monaghan, Weisong Shi