Sciweavers

1998 search results - page 182 / 400
» Situated Control Rules
Sort
View
CSREASAM
2006
15 years 6 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
LCC
1994
248views Algorithms» more  LCC 1994»
15 years 9 months ago
Comparing the Power of Monadic NP Games
The descriptive complexity of a problem is the complexity of describing the problem in some logical formalism. One of the few techniques for proving separation results in descripti...
Ronald Fagin
ICRA
2008
IEEE
149views Robotics» more  ICRA 2008»
15 years 11 months ago
Basketball robot: Ball-On-Plate with pure haptic information
— Building a basketball robot is a recently launched project at the Institute of Automatic Control Engineering (LSR) for investigating fast manipulation with non-negligible dynam...
Kwang-Kyu Lee, Georg Batz, Dirk Wollherr
ECUMN
2007
Springer
15 years 11 months ago
Study and Enhancement of DCCP over DiffServ Assured Forwarding Class
The Datagram Congestion Control Protocol (DCCP) has been proposed as a transport protocol which supports real-time traffic. In this paper, we focus on the use of DCCP/CCID3 (Cong...
Emmanuel Lochin, Guillaume Jourjon, Laurent Dairai...
MMNS
2004
161views Multimedia» more  MMNS 2004»
15 years 6 months ago
Adaptive Video Streaming in Presence of Wireless Errors
Real-time video streaming with rate adaptation to network load/congestion represents an efficient solution to its coexistence with conventional TCP data services. Naturally, the st...
Guang Yang 0001, Mario Gerla, Medy Sanadidi