Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
CADE
2011
Springer
9 years 4 months ago
ASASP: Automated Symbolic Analysis of Security Policies
We describe asasp, a symbolic reachability procedure for the analysis of administrative access control policies. The tool represents access policies and their administrative action...
Francesco Alberti, Alessandro Armando, Silvio Rani...
GECCO
2011
Springer
256views Optimization» more  GECCO 2011»
9 years 7 months ago
Evolving complete robots with CPPN-NEAT: the utility of recurrent connections
This paper extends prior work using Compositional Pattern Producing Networks (CPPNs) as a generative encoding for the purpose of simultaneously evolving robot morphology and contr...
Joshua E. Auerbach, Josh C. Bongard
CDC
2010
IEEE
124views Control Systems» more  CDC 2010»
9 years 11 months ago
Hybrid control for navigation of shape-accelerated underactuated balancing systems
This paper presents a hybrid control strategy for navigation of shape-accelerated underactuated balancing systems with dynamic constraints. It extends the concept of sequential com...
Umashankar Nagarajan, George Kantor, Ralph L. Holl...
ICDIM
2010
IEEE
10 years 1 months ago
Detecting incompleteness in access control policies using data classification schemes
In a set of access control policies, incompleteness is the existence of situations for which no policy applies. Some of these situations can be exploited by attackers, to obtain un...
Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serg...
ISCA
2002
IEEE
91views Hardware» more  ISCA 2002»
10 years 9 months ago
Slack: Maximizing Performance Under Technological Constraints
Many emerging processor microarchitectures seek to manage technological constraints (e.g., wire delay, power, and circuit complexity) by resorting to nonuniform designs that provi...
Brian A. Fields, Rastislav Bodík, Mark D. H...
MABS
2004
Springer
10 years 9 months ago
A Hybrid Micro-Simulator for Determining the Effects of Governmental Control Policies on Transport Chains
Abstract. A simulation-based tool is described which will be used to investigate how the actors in a transport chain are expected to act when different types of governmental contro...
Markus Bergkvist, Paul Davidsson, Jan A. Persson, ...
IROS
2007
IEEE
157views Robotics» more  IROS 2007»
10 years 10 months ago
Autonomous blimp control using model-free reinforcement learning in a continuous state and action space
— In this paper, we present an approach that applies the reinforcement learning principle to the problem of learning height control policies for aerial blimps. In contrast to pre...
Axel Rottmann, Christian Plagemann, Peter Hilgers,...
IROS
2007
IEEE
127views Robotics» more  IROS 2007»
10 years 10 months ago
Dynamic redistribution of a swarm of robots among multiple sites
Abstract— We present an approach for the dynamic assignment and reassignment of a large team of homogeneous robotic agents to multiple locations with applications to search and r...
Ádám M. Halász, M. Ani Hsieh,...
CDC
2008
IEEE
120views Control Systems» more  CDC 2008»
10 years 10 months ago
Navigation-based optimization of stochastic strategies for allocating a robot swarm among multiple sites
— We present a decentralized, communication-less approach to the dynamic allocation of a swarm of homogeneous robots to a target distribution among multiple sites. Building on ou...
Spring Berman, Ádám M. Halász...
INFOCOM
2009
IEEE
10 years 11 months ago
Structured Admission Control Policy in Heterogeneous Wireless Networks with Mesh Underlay
—In this paper, we investigate into optimal admission control policies for Heterogeneous Wireless Networks (HWN), considering an integration of wireless mesh networks with an ove...
Amin Farbod, Ben Liang
books