Sciweavers

449 search results - page 83 / 90
» User experiences with sharing and access control
Sort
View
ICRA
2002
IEEE
105views Robotics» more  ICRA 2002»
15 years 2 months ago
A Robotic Library System for an Off-Site Shelving Facility
This paper describes a unique robotics project, Comprehensive Access to Printed Materials (CAPM), within the context of libraries. As libraries provide a growing array of digital ...
Jackrit Suthakorn, Sangyoon Lee, Yu Zhou, Rory Tho...
GECCO
2008
Springer
123views Optimization» more  GECCO 2008»
14 years 10 months ago
MLS security policy evolution with genetic programming
In the early days a policy was a set of simple rules with a clear intuitive motivation that could be formalised to good effect. However the world is becoming much more complex. S...
Yow Tzu Lim, Pau-Chen Cheng, Pankaj Rohatgi, John ...
FSR
2003
Springer
251views Robotics» more  FSR 2003»
15 years 2 months ago
Distributed Search and Rescue with Robot and Sensor Teams
We develop a network of distributed mobile sensor systems as a solution to the emergency response problem. The mobile sensors are inside a building and they form a connected ad-ho...
George Kantor, Sanjiv Singh, Ronald A. Peterson, D...
ACSAC
2002
IEEE
15 years 2 months ago
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later
Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
Richard A. Kemmerer
ICPPW
2002
IEEE
15 years 2 months ago
A Fast Handoff Scheme For IP over Bluetooth
Recently, the low price and the small size of the mobile device makes a great success in personal mobile communication. A lot of people use a cell phone, PDA, and laptop computer ...
Sang-Hun Chung, Hyunsoo Yoon, Jung Wan Cho