Sciweavers

1307 search results - page 83 / 262
» Follow the intellectual property
Sort
View
RV
2010
Springer
127views Hardware» more  RV 2010»
14 years 12 months ago
You Should Better Enforce Than Verify
This tutorial deals with runtime enforcement which is an extension of runtime verification aiming to circumvent misbehaviors of systems. After an historical overview of previous a...
Yliès Falcone
ICRA
2009
IEEE
170views Robotics» more  ICRA 2009»
15 years 8 months ago
Path diversity is only part of the problem
— The goal of motion planning is to find a feasible path that connects two positions and is free from collision with obstacles. Path sets are a robust approach to this problem i...
Ross A. Knepper, Matthew T. Mason
INFOCOM
1998
IEEE
15 years 5 months ago
Compact and Unforgeable Key Establishment over an ATM Network
Authenticated session key establishment is a central issue in network security. This paper addresses a question on whether we can design a compact, efficient and authenticated key ...
Yuliang Zheng, Hideki Imai
ATAL
2011
Springer
14 years 1 months ago
Solving Stackelberg games with uncertain observability
Recent applications of game theory in security domains use algorithms to solve a Stackelberg model, in which one player (the leader) first commits to a mixed strategy and then th...
Dmytro Korzhyk, Vincent Conitzer, Ronald Parr
IROS
2006
IEEE
96views Robotics» more  IROS 2006»
15 years 7 months ago
Turning Maneuvers of a Multi-legged Modular Robot Using Its Inherent Dynamic Characteristics
— This paper deals with the motion of a multi-legged modular robot. The robot consists of six homogenous modules, each of which has a body and two legs and is connected to the ot...
Shinya Aoi, Hitoshi Sasaki, Kazuo Tsuchiya