Sciweavers

2801 search results - page 456 / 561
» On the Adequateness of the Connection Method
Sort
View
ICRA
1998
IEEE
101views Robotics» more  ICRA 1998»
15 years 2 months ago
An Approach to Reduction of Hysteresis in Smart Materials
This paper addresses the problem of reducing the hysteresis found in the actuation of most smart materials. They are divided in two groups: systems with no saturation (e.g. piezoe...
Juan Manuel Cruz-Hernández, Vincent Hayward
SP
1998
IEEE
116views Security Privacy» more  SP 1998»
15 years 2 months ago
Strand Spaces: Why is a Security Protocol Correct?
A strand is a sequence of events; it represents either the execution of legitimate party in a security protocol or else a sequence of actions by a penetrator. A strand space is a ...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...
EUROMICRO
1997
IEEE
15 years 2 months ago
The Harpoon security system for helper programs on a Pocket Companion
In this paper we present a security framework for executing foreign programs, called helpers, on a Pocket Companion: a wireless hand-held computer. A helper program as proposed is...
Gerard J. M. Smit, Paul J. M. Havinga, Daniël...
HASE
1997
IEEE
15 years 2 months ago
ReSoFT: A Reusable Testbed for Development and Evaluation of Software Fault-Tolerant Systems
The Reusable Software Fault Tolerance Testbed ReSoFT was developed to facilitate the development and evaluation of high-assurance systems that require tolerance of both hardware...
Kam S. Tso, Eltefaat Shokri, Roger J. Dziegiel Jr.
PG
1997
IEEE
15 years 2 months ago
Real-time virtual humans
The last few years have seen great maturationin the computation speed and control methods needed to portray 3D virtualhumanssuitableforreal interactiveapplications. We first desc...
Norman I. Badler