Sciweavers

385 search results - page 27 / 77
» constraints 1999
Sort
View
92
Voted
CSFW
1999
IEEE
15 years 4 months ago
Security Function Interactions
We use a compositional framework to model security architectures involving heterogeneous and distributed security functions. Our goal is to assist the ITSEC evaluation of suitabil...
Pierre Bieber
63
Voted
SIGCSE
1999
ACM
73views Education» more  SIGCSE 1999»
15 years 4 months ago
A student-directed computing community
We describe a computing facility created, supported, maintained, and used entirely by undergraduatestudents. This facility exists outside of the instructional support system,so th...
Adam Bonner
70
Voted
ICRA
1999
IEEE
87views Robotics» more  ICRA 1999»
15 years 4 months ago
Toppling Manipulation
This paper describes a robotic manipulation primitive called toppling--knocking a part over. We derive the mechanical conditions for toppling, express these as constraints on robo...
Kevin M. Lynch
107
Voted
INFOCOM
1999
IEEE
15 years 4 months ago
Guaranteeing Statistical QoS to Regulated Traffic: The Single Node Case
Multimedia traffic can typically tolerate some loss but has rigid delay constraints. A natural QoS requirement for a multimedia connection is a prescribed bound on the the fraction...
Martin Reisslein, Keith W. Ross, Srinivas Rajagopa...
94
Voted
ECMAST
1999
Springer
116views Multimedia» more  ECMAST 1999»
15 years 4 months ago
Watermarking in the MPEG-4 Context
This paper presents the constraints involved by MPEG-4 to copyright protection systems based upon watermarking technology. It proposes also an assessment methodology in order to ev...
Didier Nicholson, Panos Kudumakis, Jean-Fran&ccedi...