Sciweavers

960 search results - page 17 / 192
» The disaster of central control
Sort
View
LICS
2003
IEEE
15 years 5 months ago
Logic in Access Control
Access control is central to security in computer systems. Over the years, there have been many efforts to explain and to improve access control, sometimes with logical ideas and ...
Martín Abadi
ROMAN
2007
IEEE
156views Robotics» more  ROMAN 2007»
15 years 6 months ago
Development and User Testing of the Gestural Joystick for Gloves-On Hazardous Environments
— For controlling robots in an urban search and rescue (USAR) application, we present a wearable joystick with improved sensing capability as well as Giant MagnetoResistance(GMR)...
Jaewook Bae, Amy C. Larson, Richard M. Voyles, Roy...
COMPSAC
2002
IEEE
15 years 4 months ago
Designing a Distributed Software Development Support System Using a Peer-to-Peer Architecture
Distributed software development support systems typically use a centralized client-server architecture. This approach has some drawbacks such as the participants may experience l...
Seth Bowen, Frank Maurer
RTSS
1996
IEEE
15 years 3 months ago
Value-cognizant admission control for RTDB systems
Admission control and overload management techniques are central to the design and implementation of RealTime Database Systems. In this paper, we motivate the need for these mecha...
Azer Bestavros, Sue Nagy
84
Voted
IROS
2006
IEEE
146views Robotics» more  IROS 2006»
15 years 5 months ago
Formation Control of Underactuated Surface Vessels using the Null-Space-Based Behavioral Control
— In this paper the application of a behavior-based control approach, namely the Null-Space-based Behavioral control, to coordinate a fleet of autonomous surface vessels is pres...
Filippo Arrichiello, Stefano Chiaverini, Thor I. F...