Sciweavers

2702 search results - page 439 / 541
» constraints 2008
Sort
View
HAPTICS
2008
IEEE
15 years 4 months ago
Model and Modeless Friction Compensation: Application to a Defective Haptic Interface
Abstract. This paper describes a preliminary work devoted to the design of a control architecture for a defective haptic interface, i.e. an underactuated haptic interface not able ...
Gianni Borghesan, Claudio Melchiorri
HASE
2008
IEEE
15 years 4 months ago
Small Logs for Transactional Services: Distinction is Much More Accurate than (Positive) Discrimination
For complex services, logging is an integral part of many middleware aspects, especially, transactions and monitoring. In the event of a failure, the log allows us to deduce the c...
Debmalya Biswas, Thomas Gazagnaire, Blaise Genest
HICSS
2008
IEEE
128views Biometrics» more  HICSS 2008»
15 years 4 months ago
Service Composition Language to Unify Simulation and Optimization of Supply Chains
Proposed and developed is the language Service Composition (SC) CoJava, which extends the programming language Java with (1) a modular service composition framework; (2) an extens...
Alexander Brodsky, Malak Al-Nory, Hadon Nash
HOST
2008
IEEE
15 years 4 months ago
IC Activation and User Authentication for Security-Sensitive Systems
—A number of applications depend on the protection of security-sensitive hardware, preventing unauthorized users from gaining access to the functionality of the integrated circui...
Jiawei Huang, John Lach
IAT
2008
IEEE
15 years 4 months ago
Beyond Quasi-linear Utility: Strategy/False-Name-Proof Multi-unit Auction Protocols
We develop strategy/false-name-proof multi-unit auction protocols for non-quasi-linear utilities. One almost universal assumption in auction theory literature is that each bidder ...
Yuko Sakurai, Yasumasa Saito, Atsushi Iwasaki, Mak...