Sciweavers

18 search results - page 4 / 4
» Safety Analysis for a Human-Friendly Manipulator
Sort
View
ESOP
2005
Springer
13 years 10 months ago
Programming with Explicit Security Policies
Are computing systems trustworthy? To answer this, we need to know three things: what the systems are supposed to do, what they are not supposed to do, and what they actually do. A...
Andrew C. Myers
PASTE
2004
ACM
13 years 10 months ago
Resolving and applying constraint queries on context-sensitive analyses
A context-sensitive analysis is an analysis in which program elements are assigned sets of properties that depend upon the context in which they occur. For analyses on imperative ...
James Ezick
VIS
2004
IEEE
227views Visualization» more  VIS 2004»
14 years 6 months ago
Intuitive and Interactive Modification of Large Finite Element Models
Virtual prototyping is increasingly replacing real mock-ups and experiments in industrial product development. Part of this process is the simulation of structural and functional ...
Dirc Rose, Katrin Bidmon, Thomas Ertl