Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMay 2020
Understanding Software Security from Design to Deployment
ACM SIGSOFT Software Engineering Notes (SIGSOFT), Volume 45, Issue 2Pages 25–26https://doi.org/10.1145/3385678.3385687Analyzing, implementing and maintaining security requirements of software-intensive systems and achieving truly secure software requires planning for security from ground up, and continuously assuring that security is maintained across the software's ...
- posterApril 2013
Expressing a robot's confidence with motion-based artificial subtle expressions
CHI EA '13: CHI '13 Extended Abstracts on Human Factors in Computing SystemsPages 1023–1028https://doi.org/10.1145/2468356.2468539In this paper, motion-based Artificial Subtle Expression (ASE) as a novel implementation of ASE is described, in which a robot expresses confidence in its advice to a human. Confidence in advice is one of robot's useful internal states, and it is an ...
- rfcMay 2005
RFC 4054: Impairments and Other Constraints on Optical Layer Routing
Optical networking poses a number challenges for Generalized Multi-Protocol Label Switching (GMPLS). Fundamentally, optical technology is an analog rather than digital technology whereby the optical layer is lowest in the transport hierarchy and hence ...