Sciweavers

10156 search results - page 49 / 2032
» Step by Step to Histories
Sort
View
ACSAC
2005
IEEE
15 years 5 months ago
User-Centered Security: Stepping Up to the Grand Challenge
User-centered security has been identified as a grand challenge in information security and assurance. It is on the brink of becoming an established subdomain of both security and...
Mary Ellen Zurko
DEEC
2005
IEEE
15 years 5 months ago
Ontologizing EDI: First Steps and Initial Experience
Electronic Data Interchange (EDI) standards for transmission of business messages were promulgated in the 1970s. As standards became more complex to provide additional message typ...
Douglas Foxvog, Christoph Bussler
ICNP
2005
IEEE
15 years 5 months ago
Can coexisting overlays inadvertently step on each other?
By allowing end hosts to make routing decisions at the application level, different overlay networks may unintentionally interfere with each other. This paper describes how multip...
Ram Keralapura, Chen-Nee Chuah, Nina Taft, Gianluc...
ICRA
2005
IEEE
151views Robotics» more  ICRA 2005»
15 years 5 months ago
Multi-Step Look-Ahead Trajectory Planning in SLAM: Possibility and Necessity
Abstract— In this paper, the possibility and necessity of multistep trajectory planning in Extended Kalman Filter (EKF) based SLAM is investigated. The objective of the trajector...
Shoudong Huang, Ngai Ming Kwok, Gamini Dissanayake...