Sciweavers

3357 search results - page 105 / 672
» Controlling Complexity
Sort
View
ICRA
2008
IEEE
197views Robotics» more  ICRA 2008»
15 years 4 months ago
Approximate optimal control of the compass gait on rough terrain
Abstract— In this paper, we explore the capabilities of actuated models of the compass gait walker on rough terrain. We solve for the optimal high-level feedback policy to negoti...
Katie Byl, Russ Tedrake
IJNSEC
2006
112views more  IJNSEC 2006»
14 years 10 months ago
An Access Control System with Time-constraint Using Support Vector Machines
Access control is an important issue in information security. It is a necessary mechanism for protecting data in a computer system. In this paper, we apply support vector machines...
Chin-Chen Chang, Iuon-Chang Lin, Chia-Te Liao
TRIDENTCOM
2010
IEEE
14 years 7 months ago
Managing Distributed Applications Using Gush
Deploying and controlling experiments running on a distributed set of resources is a challenging task. Software developers often spend a significant amount of time dealing with the...
Jeannie Albrecht, Danny Yuxing Huang
SCIA
2007
Springer
118views Image Analysis» more  SCIA 2007»
15 years 4 months ago
Reconstruction of 3D Curves for Quality Control
In the area of quality control by vision, the reconstruction of 3D curves is a convenient tool to detect and quantify possible anomalies. Whereas other methods exist that allow us ...
Hanna Martinsson, François Gaspard, Adrien ...
CORR
2010
Springer
116views Education» more  CORR 2010»
14 years 7 months ago
Managing Delegation in Access Control Models
In the field of access control, delegation is an important aspect that is considered as a part of the administration mechanism. Thus, a complete access control must provide a flex...
Meriam Ben-Ghorbel-Talbi, Frédéric C...