Sciweavers

4798 search results - page 886 / 960
» Time for a change
Sort
View
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
15 years 4 months ago
Apply Model Checking to Security Analysis in Trust Management
Trust management is a form of access control that uses delegation to achieve scalability beyond a single organization or federation. However, delegation can be difficult to contr...
Mark Reith, Jianwei Niu, William H. Winsborough
ICRA
2007
IEEE
155views Robotics» more  ICRA 2007»
15 years 4 months ago
Dogged Learning for Robots
— Ubiquitous robots need the ability to adapt their behaviour to the changing situations and demands they will encounter during their lifetimes. In particular, non-technical user...
Daniel H. Grollman, Odest Chadwicke Jenkins
INFOCOM
2007
IEEE
15 years 4 months ago
Feedforward SDL Constructions of Output-Buffered Multiplexers and Switches with Variable Length Bursts
Abstract— In this paper, we study the problem of exact emulation of two types of optical queues: (i) N-to-1 output-buffered multiplexers with variable length bursts, and (ii) N ...
Yi-Ting Chen, Cheng-Shang Chang, Jay Cheng, Duan-S...
INFOCOM
2007
IEEE
15 years 4 months ago
Multicast Scheduling in Cellular Data Networks
— Multicast is an efficient means of transmitting the same content to multiple receivers while minimizing network resource usage. Applications that can benefit from multicast s...
Hyungsuk Won, Han Cai, Do Young Eun, Katherine Guo...
MOBIQUITOUS
2007
IEEE
15 years 4 months ago
Battery-Aware Embedded GPS Receiver Node
—This paper discusses the design and implementation of an ultra low power embedded GPS receiver node for use in remote monitoring situations where battery life is of the utmost i...
Dejan Raskovic, David Giessel