Sciweavers

2838 search results - page 340 / 568
» Verifying Controlled Components
Sort
View
DSN
2005
IEEE
15 years 6 months ago
Authenticated System Calls
System call monitoring is a technique for detecting and controlling compromised applications by checking at runtime that each system call conforms to a policy that specifies the ...
Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, ...
101
Voted
IAT
2005
IEEE
15 years 6 months ago
Trust Model for Open Ubiquitous Agent Systems
Trust management model that we present is adapted for ubiquitous devices cooperation, rather than for classic client-supplier relationship. We use fuzzy numbers to represent trust...
Martin Rehák, Lukás Foltýn, M...
ICDCS
2005
IEEE
15 years 6 months ago
An Update Protocol for XML Documents in Distributed and Cooperative Systems
Securing data is becoming a crucial need for most internet-based applications. Whereas the problem of data confidentiality has been widely investigated, the problem of how to ens...
Yunhua Koglin, Giovanni Mella, Elisa Bertino, Elen...
74
Voted
ICRA
2005
IEEE
86views Robotics» more  ICRA 2005»
15 years 6 months ago
A New Perspective on O(n) Mass-Matrix Inversion for Serial Revolute Manipulators
– This paper describes a new algorithm for the efficient mass-matrix inversion of serial manipulators. Whereas several well-known O(n) algorithms already exist, our presentation ...
Kiju Lee, Gregory S. Chirikjian
115
Voted
ICRA
2005
IEEE
186views Robotics» more  ICRA 2005»
15 years 6 months ago
Experimental Studies of a Neural Oscillator for Biped Locomotion with QRIO
— Recently, there has been a growing interest in biologically inspired biped locomotion control with Central Pattern Generator (CPG). However, few experimental attempts on real h...
Gen Endo, Jun Nakanishi, Jun Morimoto, Gordon Chen...