Sciweavers

2024 search results - page 190 / 405
» A Logic Based Approach for Dynamic Access Control
Sort
View
138
Voted
POLICY
2007
Springer
15 years 10 months ago
Towards Practical Security Monitors of UML Policies for Mobile Applications
—There is increasing demand for running interacting applications in a secure and controllable way on mobile devices. Such demand is not fully supported by the Java/.NET security ...
Fabio Massacci, Katsiaryna Naliuka
141
Voted
SAINT
2008
IEEE
15 years 10 months ago
Dynamic Relay Node Placement in Wireless Sensor Networks
In this paper we present an online algorithm that attacks the problem of placing relay nodes in regions where high localized congestion is detected. Congestion refers to the netwo...
Jorge Mena, Vana Kalogeraki
IROS
2009
IEEE
187views Robotics» more  IROS 2009»
15 years 10 months ago
Three-dimensional Limit Cycle Walking with joint actuation
— This paper describes 3D biped walking generation and control based on Limit Cycle Walking. In our study, we use the simplest possible 3D biped model with three DOFs, incorporat...
Kentaro Miyahara, Yuzuru Harada, Dragomir N. Nench...
147
Voted
JODL
2000
123views more  JODL 2000»
15 years 3 months ago
On Z39.50 wrapping and description logics
Z39.50 is a client/server protocol widely used in digital libraries and museums for searching and retrieving information spread over a number of heterogeneous sources. To overcome ...
Yannis Velegrakis, Vassilis Christophides, Panos C...
EUROMICRO
1999
IEEE
15 years 8 months ago
Enhancing Security in the Memory Management Unit
We propose an hardware solution to several security problems that are difficult to solve on classical processor architectures, like licensing, electronic commerce, or software pri...
Tanguy Gilmont, Jean-Didier Legat, Jean-Jacques Qu...