Sciweavers

1649 search results - page 29 / 330
» On-Line Change Mechanisms
Sort
View
GECCO
2005
Springer
114views Optimization» more  GECCO 2005»
15 years 7 months ago
A resource-allocation mechanism for multiagent networks
The nature of computer networks and the manner in which network services are provided are changing dramatically. Network architectures that employ virtual mobile agents to provide...
Vishakh, Nicholas Urrea, Tadashi Nakano, Tatsuya S...
CDC
2008
IEEE
169views Control Systems» more  CDC 2008»
15 years 3 months ago
Control of underactuated mechanical systems: Observer design and position feedback stabilization
We identify a class of mechanical systems for which a globally exponentially stable reduced order observer can be designed. The class is characterized by (the solvability of) a set...
Aneesh Venkatraman, Romeo Ortega, Ioannis Sarras, ...
109
Voted
CN
2007
97views more  CN 2007»
15 years 1 months ago
Security enhancement of an IC-card-based remote login mechanism
Wang et al. presented a remote password authentication scheme using IC (Integrated Circuit) cards in 2004. Unfortunately, we discovered that their scheme is unable to withstand th...
Ting-Fang Cheng, Jung-San Lee, Chin-Chen Chang
BVAI
2007
Springer
15 years 8 months ago
A Robotic Architecture with Innate Releasing Mechanism
In this paper we analyze the influence of the frequency of sensor data readings on the behaviours of a Robotic System (RS). This is done in the framework of behaviour based archit...
Ernesto Burattini, Silvia Rossi
TRUSTBUS
2005
Springer
15 years 7 months ago
Protection Mechanisms Against Phishing Attacks
Abstract. Approaches against Phishing can be classified into modifications of the traditional PIN/TAN-authentication on the one hand and approaches that try to reduce the probabi...
Klaus Plößl, Hannes Federrath, Thomas N...