Sciweavers

960 search results - page 48 / 192
» The disaster of central control
Sort
View
ICISC
2004
127views Cryptology» more  ICISC 2004»
15 years 1 months ago
Identity-Based Access Control for Ad Hoc Groups
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
ICRA
2008
IEEE
179views Robotics» more  ICRA 2008»
15 years 6 months ago
Biological stiffness control strategies for the Anatomically Correct Testbed (ACT) hand
— With the goal of developing biologically inspired manipulation strategies for an anthropomorphic hand, we investigated how the human central nervous system utilizes the hands r...
Ravi Balasubramanian, Yoky Matsuoka
IROS
2007
IEEE
176views Robotics» more  IROS 2007»
15 years 6 months ago
Controlling a team of ground robots via an aerial robot
— We consider the task of controlling a large team of nonholonomic ground robots with an unmanned aerial vehicle in a decentralized manner that is invariant to the number of grou...
Nathan Michael, Jonathan Fink, Vijay Kumar
MSN
2007
Springer
160views Sensor Networks» more  MSN 2007»
15 years 6 months ago
Access Scheduling on the Control Channels in TDMA Wireless Mesh Networks
The access scheduling on the control channels in TDMA wireless mesh networks is studied in this paper. The problem is to assign time-slots for each node in the network to access th...
Hongju Cheng, Xiaohua Jia, Hai Liu
SPC
2005
Springer
15 years 5 months ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...