Sciweavers

551 search results - page 53 / 111
» Preventing existence
Sort
View
IROS
2008
IEEE
115views Robotics» more  IROS 2008»
15 years 6 months ago
A framework for optimal gait generation via learning optimal control using virtual constraint
— This paper proposes an optimal gait generation framework using virtual constraint and learning optimal control. In this method, firstly, we add a constraint by a virtual poten...
Satoshi Satoh, Kenji Fujimoto, Sang-Ho Hyon
NOMS
2008
IEEE
15 years 6 months ago
Utility-based placement of dynamic Web applications with fairness goals
Abstract—We study the problem of dynamic resource allocation to clustered Web applications. We extend application server middleware with the ability to automatically decide the s...
David Carrera, Malgorzata Steinder, Ian Whalley, J...
GLOBECOM
2007
IEEE
15 years 6 months ago
Passive Listening and Intrusion Management in Commodity Wi-Fi Networks
—We examine a widely accepted myth about passive listening in wireless networks, and give a detailed description of how to achieve real “passive listening.” Then we develop a...
Liran Ma, Amin Y. Teymorian, Xiuzhen Cheng
HICSS
2007
IEEE
117views Biometrics» more  HICSS 2007»
15 years 6 months ago
Offering Mobile Security as a Service
The objective of this paper is to study how a software product company can expand its productbased business with the Software as a Service (SaaS) model into the mobile setting. We...
Aki Lassila
HICSS
2007
IEEE
269views Biometrics» more  HICSS 2007»
15 years 6 months ago
Wireless Forensic Analysis Tools for Use in the Electronic Evidence Collection Process
This paper discusses the need for both a series of electronic tools and procedural changes to the evidence collection process to accommodate the possibilities of wireless technolo...
Benjamin Turnbull, Jill Slay