Sciweavers

981 search results - page 132 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
ESOP
2009
Springer
15 years 8 months ago
Amortised Memory Analysis Using the Depth of Data Structures
Hofmann and Jost have presented a heap space analysis [1] that finds linear space bounds for many functional programs. It uses an amortised analysis: assigning hypothetical amount...
Brian Campbell
ISCAS
2008
IEEE
97views Hardware» more  ISCAS 2008»
15 years 8 months ago
Quality-aware GSM speech watermarking
—Use of watermarking techniques to provide authentication and tamper proofing of speech in mobile environment is becoming important. However, the current efforts do not allow for...
K. J.-L. Christabel, Sabu Emmanuel, Mohan S. Kanka...
ISSA
2004
15 years 2 months ago
A Unified Architecture For Automatic Software Updates
This paper attempts to address the issue of hardening the internal security of an organisation's network by easing its patch management. Traditionally security has been model...
Dominic White
AAAI
2004
15 years 2 months ago
Interleaving Temporal Planning and Execution in Robotics Domains
Many autonomous systems such as mobile robots, UAVs or spacecraft, have limited resource capacities and move in dynamic environments. Performing on-board mission planning and exec...
Solange Lemai, Félix Ingrand
AAAI
1992
15 years 2 months ago
Reactive Navigation through Rough Terrain: Experimental Results
This paper describes a series of experiments that were performed on the Rocky III robot.1 Rocky III is a small autonomous rover capable of navigating through rough outdoor terrain...
David P. Miller, Rajiv S. Desai, Erann Gat, Robert...