Sciweavers

1422 search results - page 248 / 285
» Design, Implementation and Performance Evaluation of IP-VPN
Sort
View
AROBOTS
2010
144views more  AROBOTS 2010»
14 years 11 months ago
EL-E: an assistive mobile manipulator that autonomously fetches objects from flat surfaces
Abstract Assistive mobile robots that autonomously manipulate objects within everyday settings have the potential to improve the lives of the elderly, injured, and disabled. Within...
Advait Jain, Charles C. Kemp
JCS
2008
119views more  JCS 2008»
14 years 11 months ago
Synthesising verified access control systems through model checking
We present a framework for evaluating and generating access control policies. The framework contains a modelling formalism called RW, which is supported by a model checking tool. ...
Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev
AAMAS
2004
Springer
14 years 11 months ago
Automated Assistants for Analyzing Team Behaviors
Multi-agent teamwork is critical in a large number of agent applications, including training, education, virtual enterprises and collective robotics. The complex interactions of ag...
Ranjit Nair, Milind Tambe, Stacy Marsella, Taylor ...
CN
2002
117views more  CN 2002»
14 years 11 months ago
Achieving differentiated services through multi-class probabilistic priority scheduling
Differentiated Services (DiffServ) is a promising architecture for the next generation Internet due to its scalable and flexible design. In DiffServ, scheduling disciplines play an...
Chen-Khong Tham, Qi Yao, Yuming Jiang
75
Voted
CORR
2002
Springer
93views Education» more  CORR 2002»
14 years 11 months ago
Secure History Preservation Through Timeline Entanglement
A secure timeline is a tamper-evident historic record of the states through which a system goes throughout its operational history. Secure timelines can help us reason about the t...
Petros Maniatis, Mary Baker