Sciweavers

789 search results - page 29 / 158
» Pushing using Compliance
Sort
View
TSMC
1998
88views more  TSMC 1998»
15 years 4 months ago
Intelligent compliant motion control
—The role of a compliant motion scheme is to control a robot manipulator in contact with its environment. By accommodating with the interaction force, the manipulator can be used...
Omar M. Al-Jarrah, Yuan F. Zheng
HUC
2011
Springer
14 years 4 months ago
Exploring micro-incentive strategies for participant compensation in high-burden studies
Micro-incentives represent a new but little-studied trend in participant compensation for user studies. In this paper, we use a combination of statistical analysis and models from...
Mohamed Musthag, Andrew Raij, Deepak Ganesan, Sant...
MOBISYS
2010
ACM
15 years 7 months ago
PRISM: platform for remote sensing using smartphones
To realize the potential of opportunistic and participatory sensing using mobile smartphones, a key challenge is ensuring the ease of developing and deploying such applications, w...
Tathagata Das, Prashanth Mohan, Venkata N. Padmana...
IEEEARES
2007
IEEE
15 years 11 months ago
Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management
The catchword “compliance” dominates the actual debate about Identity Management and information security like few before. Companies need to comply with a variety of internal ...
Ludwig Fuchs, Günther Pernul
ICIP
2006
IEEE
16 years 6 months ago
Selective Encryption of Human Skin in JPEG Images
In this study we propose a new approach for selective encryption in the Huffman coding of the Discrete Cosine Transform (DCT) coefficients using the Advanced Encryption Standard (...
Adrian G. Bors, José M. Rodrigues, William ...