Sciweavers

Share
5 search results - page 1 / 1
» Reinforcing Access Control Using Fuzzy Relation Equations
Sort
View
CSREASAM
2006
9 years 3 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
ISCA
2008
IEEE
137views Hardware» more  ISCA 2008»
9 years 8 months ago
Self-Optimizing Memory Controllers: A Reinforcement Learning Approach
Efficiently utilizing off-chip DRAM bandwidth is a critical issue in designing cost-effective, high-performance chip multiprocessors (CMPs). Conventional memory controllers deli...
Engin Ipek, Onur Mutlu, José F. Martí...
SP
2005
IEEE
104views Security Privacy» more  SP 2005»
9 years 8 months ago
On Safety in Discretionary Access Control
An apparently prevailing myth is that safety is undecidable in Discretionary Access Control (DAC); therefore, one needs to invent new DAC schemes in which safety analysis is decid...
Ninghui Li, Mahesh V. Tripunitara
SIMPRA
2010
110views more  SIMPRA 2010»
9 years 24 days ago
Singularity-free dynamic equations of vehicle-manipulator systems
In this paper we derive the singularity-free dynamic equations of vehiclemanipulator systems using a minimal representation. These systems are normally modeled using Euler angles,...
Pål Johan From, Vincent Duindam, Kristin Ytt...
ICRA
2000
IEEE
108views Robotics» more  ICRA 2000»
9 years 6 months ago
Controllability of Single Input Rolling Manipulation
This paper investigates controllability of underactuated rolling systems consisting of a smooth object rolling on a moving smooth surface. Our system consists of a spherical ball ...
Prasun Choudhury, Kevin M. Lynch
books