Sciweavers

3898 search results - page 495 / 780
» Maintaining Component-Based Systems
Sort
View
IEEEARES
2007
IEEE
15 years 11 months ago
Aggregating and Deploying Network Access Control Policies
The existence of errors or inconsistencies in the configuration of security components, such as filtering routers and/or firewalls, may lead to weak access control policies — ...
Joaquín García-Alfaro, Fréd&e...
IROS
2007
IEEE
145views Robotics» more  IROS 2007»
15 years 11 months ago
A quantitative method for comparing trajectories of mobile robots using point distribution models
— In the field of mobile robotics, trajectory details are seldom taken into account to qualify robot performance. Most metrics rely mainly on global results such as the total ti...
Pierre Roduit, Alcherio Martinoli, Jacques Jacot
VR
2007
IEEE
115views Virtual Reality» more  VR 2007»
15 years 11 months ago
Effective Cooperative Haptic Interaction over the Internet
We present a system that enables, for the first time, effective transatlantic cooperative haptic manipulation of objects whose motion is computed using a physically-based model. ...
Mashhuda Glencross, Caroline Jay, Jeff Feasel, Luv...
135
Voted
CCS
2007
ACM
15 years 11 months ago
Preserving privacy in gps traces via uncertainty-aware path cloaking
Motivated by a probe-vehicle based automotive traffic monitoring system, this paper considers the problem of guaranteed anonymity in a dataset of location traces while maintainin...
Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabad...
153
Voted
ESORICS
2007
Springer
15 years 11 months ago
Incorporating Temporal Capabilities in Existing Key Management Schemes
The problem of key management in access hierarchies studies ways to assign keys to users and classes such that each user, after receiving her secret key(s), is able to independentl...
Mikhail J. Atallah, Marina Blanton, Keith B. Frikk...