Sciweavers

4397 search results - page 514 / 880
» Relational Algebra Operations
Sort
View
CEC
2007
IEEE
15 years 8 months ago
Mobile robot global localization using differential evolution and particle swarm optimization
For a mobile robot to move in a known environment and operate successfully, first it needs to robustly determine its initial position and orientation relative to the map, and then ...
Ali R. Vahdat, Naser NourAshrafoddin, Saeed Shiry ...
CC
2006
Springer
118views System Software» more  CC 2006»
15 years 8 months ago
Lightweight Lexical Closures for Legitimate Execution Stack Access
We propose a new language concept called "L-closures" for a running program to legitimately inspect/modify the contents of its execution stack. L-closures are lightweight...
Masahiro Yasugi, Tasuku Hiraishi, Taiichi Yuasa
CCS
2006
ACM
15 years 8 months ago
Optimizing BGP security by exploiting path stability
The Border Gateway Protocol (BGP) is the de facto interdomain routing protocol on the Internet. While the serious vulnerabilities of BGP are well known, no security solution has b...
Kevin R. B. Butler, Patrick McDaniel, William Aiel...
ESORICS
2006
Springer
15 years 8 months ago
Delegation in Role-Based Access Control
User delegation is a mechanism for assigning access rights available to a user to another user. A delegation operation can either be a grant or transfer operation. Delegation for r...
Jason Crampton, Hemanth Khambhammettu
168
Voted
ECAI
2000
Springer
15 years 8 months ago
The WITAS Unmanned Aerial Vehicle Project
The purpose of this paper is to provide a broad overview of the WITAS Unmanned Aerial Vehicle Project. The WITAS UAV project is an ambitious, long-term basic research project with ...
Patrik Dohrty, Gösta H. Granlund, Krzysztof K...