Sciweavers

960 search results - page 25 / 192
» The disaster of central control
Sort
View
TWC
2010
14 years 6 months ago
A Multimedia Cross-Layer Protocol for Underwater Acoustic Sensor Networks
Underwater multimedia acoustic sensor networks will enable new underwater applications such as multimedia coastal and tactical surveillance, undersea explorations, picture and vide...
Dario Pompili, Ian F. Akyildiz
IEEECIT
2005
IEEE
15 years 5 months ago
Context-sensitive Access Control Model and Implementation
Context is a key factor in making make access control decision in modern information system. But a formal context model is needed to guide research of implementation of Context-se...
Weili Han, Junjing Zhang, Xiaobo Yao
HASE
2008
IEEE
15 years 6 months ago
Privacy, Preservation and Performance: The 3 P's of Distributed Data Management
Privacy, preservation and performance (“3 P’s”) are central design objectives for distributed data management systems. However, these objectives tend to compete with one ano...
Bobji Mungamuru, Hector Garcia-Molina
FOSAD
2009
Springer
15 years 6 months ago
Logic in Access Control (Tutorial Notes)
Access control is central to security in computer systems. Over the years, there have been many efforts to explain and to improve access control, sometimes with logical ideas and t...
Martín Abadi
TROB
2008
152views more  TROB 2008»
14 years 11 months ago
Catadioptric Visual Servoing From 3-D Straight Lines
In this paper, we consider the problem of controlling a 6 DOF holonomic robot and a nonholonomic mobile robot from the projection of 3-D straight lines in the image plane of centra...
Hicham Hadj-Abdelkader, Youcef Mezouar, Philippe M...