Sciweavers

3979 search results - page 129 / 796
» Wild control operators
Sort
View
CSFW
2006
IEEE
15 years 4 months ago
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies
There is a growing interest in establishing rules to regulate the privacy of citizens in the treatment of sensitive personal data such as medical and financial records. Such rule...
Michael J. May, Carl A. Gunter, Insup Lee
ICRA
2006
IEEE
136views Robotics» more  ICRA 2006»
15 years 4 months ago
Predictive Control Algorithms using Biological Signals for Active Relative Motion Canceling in Robotic Assisted Heart Surgery
— Robotics technology promises an enhanced way of performing off-pump coronary artery bypass graft (CABG) surgery. In the robotic-assisted CABG surgery, surgeon performs the oper...
Ozkan Bebek, Murat Cenk Cavusoglu
IPCCC
2005
IEEE
15 years 3 months ago
Dynamic localization control for mobile sensor networks
Localization is a fundamental operation in mobile and self-configuring networks such as sensor networks and mobile ad hoc networks. For example, sensor location is often critical...
Sameer Tilak, Vinay Kolar, Nael B. Abu-Ghazaleh, K...
ECUMN
2004
Springer
15 years 1 months ago
A Flow-Through Workflow Control Scheme for BGP/MPLS VPN Service Provision
In a competitive telecommunications marketplace, operators must provide customers with rapid access to both new and traditional service offerings. Market share is developed through...
Daniel Won-Kyu Hong, Choong Seon Hong
LISA
2007
15 years 10 days ago
Remote Control: Distributed Application Configuration, Management, and Visualization with Plush
Support for distributed application management in large-scale networked environments remains in its early stages. Although a number of solutions exist for subtasks of application ...
Jeannie R. Albrecht, Ryan Braud, Darren Dao, Nikol...