Sciweavers

789 search results - page 29 / 158
» Pushing using Compliance
Sort
View
TSMC
1998
88views more  TSMC 1998»
14 years 10 months ago
Intelligent compliant motion control
—The role of a compliant motion scheme is to control a robot manipulator in contact with its environment. By accommodating with the interaction force, the manipulator can be used...
Omar M. Al-Jarrah, Yuan F. Zheng
HUC
2011
Springer
13 years 10 months ago
Exploring micro-incentive strategies for participant compensation in high-burden studies
Micro-incentives represent a new but little-studied trend in participant compensation for user studies. In this paper, we use a combination of statistical analysis and models from...
Mohamed Musthag, Andrew Raij, Deepak Ganesan, Sant...
MOBISYS
2010
ACM
15 years 1 months ago
PRISM: platform for remote sensing using smartphones
To realize the potential of opportunistic and participatory sensing using mobile smartphones, a key challenge is ensuring the ease of developing and deploying such applications, w...
Tathagata Das, Prashanth Mohan, Venkata N. Padmana...
76
Voted
IEEEARES
2007
IEEE
15 years 5 months ago
Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management
The catchword “compliance” dominates the actual debate about Identity Management and information security like few before. Companies need to comply with a variety of internal ...
Ludwig Fuchs, Günther Pernul
ICIP
2006
IEEE
16 years 23 days ago
Selective Encryption of Human Skin in JPEG Images
In this study we propose a new approach for selective encryption in the Huffman coding of the Discrete Cosine Transform (DCT) coefficients using the Advanced Encryption Standard (...
Adrian G. Bors, José M. Rodrigues, William ...