Sciweavers

2195 search results - page 310 / 439
» Prototyping Networked Embedded Systems
Sort
View
ECRTS
2003
IEEE
15 years 8 months ago
Time-Aware Utility-Based QoS Optimisation
This paper presents a time-aware admission control and resource allocation scheme in the context of a future generation mobile network. The quality levels (and their respective ut...
Calin Curescu, Simin Nadjm-Tehrani
ICB
2009
Springer
156views Biometrics» more  ICB 2009»
15 years 1 months ago
Bipartite Biotokens: Definition, Implementation, and Analysis
Abstract. Cryptographic transactions form the basis of many common security systems found throughout computer networks. Supporting these transactions with biometrics is very desira...
Walter J. Scheirer, Terrance E. Boult
142
Voted
TISSEC
2010
119views more  TISSEC 2010»
14 years 10 months ago
Storage-Based Intrusion Detection
Storage-based intrusion detection allows storage systems to transparently watch for suspicious activity. Storage systems are well-positioned to spot several common intruder action...
Adam G. Pennington, John Linwood Griffin, John S. ...
RAID
1999
Springer
15 years 7 months ago
Towards trapping wily intruders in the large
The rapid increase in network bandwidth from mega bits per second to giga bits per second and potentially to tera bits per second, is making it increasingly difficult to carry out...
Glenn Mansfield
122
Voted
IROS
2009
IEEE
173views Robotics» more  IROS 2009»
15 years 10 months ago
Biologically inspired compliant control of a monopod designed for highly dynamic applications
— In this paper the compliant low level control of a biologically inspired control architecture suited for bipedal dynamic walking robots is presented. It consists of elastic mec...
Sebastian Blank, Thomas Wahl, Tobias Luksch, Karst...