Sciweavers

4118 search results - page 774 / 824
» Mechanisms for usage control
Sort
View
IROS
2008
IEEE
171views Robotics» more  IROS 2008»
15 years 6 months ago
Action planner of hybrid leg-wheel robots for lunar and planetary exploration
— In this paper, we propose an action planning algorithm and its evaluation method based on dynamic simulation for a novel type of hybrid leg-wheel rover for planetary exploratio...
Eric Rohmer, Giulio Reina, Genya Ishigami, Keiji N...
ISCC
2008
IEEE
119views Communications» more  ISCC 2008»
15 years 6 months ago
Deterministic service on IEEE 802.11-like networks
Wireless IEEE 802.11 networks are typically deployed as a convenient and flexible way to access wired backbones. However, due to the inherently shared nature and physical propert...
Mario Baldi, Marco Papa Manzillo
LCN
2008
IEEE
15 years 6 months ago
Key management in wireless sensor networks with inter-network sensor roaming
Wireless Sensor Networks (WSNs) have received considerable attention in recent years and opened up new possibilities for various commercial and industrial applications. A WSN cons...
S. Choi, V. Sarangan, S. Trost
LCN
2008
IEEE
15 years 6 months ago
Firewalling wireless sensor networks: Security by wireless
—Networked sensors and actuators for purposes from production monitoring and control to home automation are in increasing demand. Until recently, the main focus laid on wired sys...
Ivan Martinovic, Nicos Gollan, Jens B. Schmitt
ACSAC
2007
IEEE
15 years 6 months ago
Limits of Static Analysis for Malware Detection
Malicious code is an increasingly important problem that threatens the security of computer systems. The traditional line of defense against malware is composed of malware detecto...
Andreas Moser, Christopher Kruegel, Engin Kirda