Sciweavers

1353 search results - page 135 / 271
» Securing Current and Future Process Control Systems
Sort
View
117
Voted
ICASSP
2010
IEEE
15 years 3 months ago
Privacy and security of features extracted from minutiae aggregates
This paper describes our recent analysis on the security and privacy of biometric feature vectors obtained from fingerprint minutiae. A large number of contiguous regions (cuboid...
Abhishek Nagar, Shantanu Rane, Anthony Vetro
105
Voted
ICRA
2010
IEEE
123views Robotics» more  ICRA 2010»
15 years 2 months ago
Robotic motion planning in dynamic, cluttered, uncertain environments
— This paper presents a strategy for planning robot motions in dynamic, cluttered, and uncertain environments. Successful and efficient operation in such environments requires r...
Noel E. Du Toit, Joel W. Burdick
129
Voted
BIRTHDAY
2006
Springer
15 years 7 months ago
Coordination of Actions in an Autonomous Robotic System
Robots are autonomous agents whose actions are performed in the real world during a period of time. There are a number of general constraints on such actions, for example that the ...
Erik Sandewall
164
Voted
HPCA
2011
IEEE
14 years 7 months ago
Mercury: A fast and energy-efficient multi-level cell based Phase Change Memory system
― Phase Change Memory (PCM) is one of the most promising technologies among emerging non-volatile memories. PCM stores data in crystalline and amorphous phases of the GST materia...
Madhura Joshi, Wangyuan Zhang, Tao Li
SACMAT
2006
ACM
15 years 9 months ago
Fine-grained role-based delegation in presence of the hybrid role hierarchy
Delegation of authority is an important process that needs to be captured by any access control model. In role-based access control models, delegation of authority involves delega...
James B. D. Joshi, Elisa Bertino