Sciweavers

630 search results - page 119 / 126
» Introducing collaboration into an application development en...
Sort
View
CCS
2008
ACM
14 years 11 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
CORR
2010
Springer
126views Education» more  CORR 2010»
14 years 9 months ago
Fundamental Limits of Wideband Localization - Part I: A General Framework
The availability of positional information is of great importance in many commercial, public safety, and military applications. The coming years will see the emergence of locationa...
Yuan Shen, Moe Z. Win
IANDC
2008
120views more  IANDC 2008»
14 years 9 months ago
A framework for compositional verification of security protocols
Automatic security protocol analysis is currently feasible only for small protocols. Since larger protocols quite often are composed of many small protocols, compositional analysi...
Suzana Andova, Cas J. F. Cremers, Kristian Gj&osla...
ICDCS
2010
IEEE
14 years 6 months ago
Versatile Stack Management for Multitasking Sensor Networks
Abstract--The networked application environment has motivated the development of multitasking operating systems for sensor networks and other low-power electronic devices, but thei...
Rui Chu, Lin Gu, Yunhao Liu, Mo Li, Xicheng Lu
IJSR
2010
152views more  IJSR 2010»
14 years 4 months ago
Safety Analysis for a Human-Friendly Manipulator
Abstract The DLR Lightweight Robot III (LWR-III) developed at the German Aerospace Center (DLR) is characterized by low inertial properties, torque sensing in each joint, and a loa...
Sami Haddadin, Alin Albu-Schäffer, Gerd Hirzi...