Sciweavers

721 search results - page 63 / 145
» A Living System Must Have Noncomputable Models
Sort
View
ECOOP
2010
Springer
15 years 5 months ago
Reasoning about the Implementation of Concurrency Abstractions on x86-TSO
ncy Abstractions on x86-TSO Scott Owens University of Cambridge Abstract. With the rise of multi-core processors, shared-memory concurrency has become a widespread feature of compu...
Scott Owens
97
Voted
ENTCS
2010
127views more  ENTCS 2010»
15 years 20 days ago
Action Prefixes: Reified Synchronization Paths in Minimal Component Interaction Automata
Component Interaction Automata provide a fitting model to capture and analyze the temporal facets of hierarchical-structured component-oriented software systems. However, the rule...
Markus Lumpe
76
Voted
DBSEC
2000
102views Database» more  DBSEC 2000»
15 years 1 months ago
Extending SQL's Grant and Revoke Operations, to Limit and Reactivate Privileges
We propose two extensions to the SQL grant/revoke security model. In SQL, grants are unconditional, so the grantor must simply trust the recipient's discretion. We allow a gr...
Arnon Rosenthal, Edward Sciore
ECUMN
2007
Springer
15 years 6 months ago
Context-Sensitive Security Framework for Pervasive Environments
Pervasive systems enable us to have an overview of what digital environments will look like in the future. Opportunities given by pervasive systems, both in terms of applications ...
Charles-Eric Pigeot, Yann Gripay, Vasile-Marian Sc...
ICRA
2007
IEEE
189views Robotics» more  ICRA 2007»
15 years 7 months ago
Stereo-based Markerless Human Motion Capture for Humanoid Robot Systems
Abstract— In this paper, we present an image-based markerless human motion capture system, intended for humanoid robot systems. The restrictions set by this ambitious goal are nu...
Pedram Azad, Ales Ude, Tamim Asfour, Rüdiger ...