Sciweavers

304 search results - page 31 / 61
» Future Directions in Role-Based Access Control Models
Sort
View
PDCAT
2005
Springer
15 years 5 months ago
Authentication with controlled anonymity in P2P systems
This paper describes a new protocol for authentication in Peer-to-Peer systems. The protocol has been designed to meet specialized requirements of P2P systems, such as lack of dir...
Adam Wierzbicki, Aneta Zwierko, Zbigniew Kotulski
ENGL
2007
94views more  ENGL 2007»
14 years 11 months ago
Development of a Functional Neuromuscular Stimulation System for Independent Ambulation of Patients with a Spinal Cord Injury
— This paper proposes the use of a controlled assistive device, aimed as a support for the impaired individuals to allow a limited ambulatory function. The aim of the overall pro...
Alejandro Garcia Blanco, Gildardo Jimenez, Pedro O...
ENGL
2007
81views more  ENGL 2007»
14 years 11 months ago
Computational Comparisons of GPC and NGPC Schemes
—In this paper the GPC and NGPC model predictive control techniques are applied to a typical plant and compared in terms of computational efficiency. The system identification an...
D. N. Rao, M. R. K. Murthy, D. N. Harshal, S. R. M...
103
Voted
MICRO
2010
IEEE
242views Hardware» more  MICRO 2010»
14 years 9 months ago
ASF: AMD64 Extension for Lock-Free Data Structures and Transactional Memory
Advanced Synchronization Facility (ASF) is an AMD64 hardware extension for lock-free data structures and transactional memory. It provides a speculative region that atomically exec...
Jae-Woong Chung, Luke Yen, Stephan Diestelhorst, M...
SSS
2010
Springer
118views Control Systems» more  SSS 2010»
14 years 10 months ago
Modeling and Analyzing Periodic Distributed Computations
The earlier work on predicate detection has assumed that the given computation is finite. Detecting violation of a liveness predicate requires that the predicate be evaluated on a...
Anurag Agarwal, Vijay K. Garg, Vinit A. Ogale