Sciweavers

8828 search results - page 1710 / 1766
» Formal methods in practice
Sort
View
ACSAC
2005
IEEE
15 years 3 months ago
Intrusion Detection in RBAC-administered Databases
A considerable effort has been recently devoted to the development of Database Management Systems (DBMS) which guarantee high assurance security and privacy. An important componen...
Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athen...
ICRA
2005
IEEE
145views Robotics» more  ICRA 2005»
15 years 3 months ago
Energy-Saving 3-Step Velocity Control Algorithm for Battery-Powered Wheeled Mobile Robots
— Energy of Wheeled Mobile Robot (WMR) is usually supplied by batteries with finite energy. In order to extend run-time of battery-powered WMR, it is necessary to minimize the e...
Chong Hui Kim, Byung Kook Kim
INFOCOM
2005
IEEE
15 years 3 months ago
A beacon-less location discovery scheme for wireless sensor networks
— In wireless sensor networks (WSNs), sensor location plays a critical role in many applications. Having a GPS receiver on every sensor node is costly. In the past, a number of l...
Lei Fang, Wenliang Du, Peng Ning
INFOCOM
2005
IEEE
15 years 3 months ago
Mobile-assisted localization in wireless sensor networks
Abstract— The localization problem is to determine an assignment of coordinates to nodes in a wireless ad-hoc or sensor network that is consistent with measured pairwise node dis...
Nissanka B. Priyantha, Hari Balakrishnan, Erik D. ...
IPPS
2005
IEEE
15 years 3 months ago
Self-Adaptive Scheduler Parameterization via Online Simulation
High-end parallel systems present a tremendous research challenge on how to best allocate their resources to match dynamic workload characteristics and user habits that are often ...
Barry Lawson, Evgenia Smirni
« Prev « First page 1710 / 1766 Last » Next »