Sciweavers

3458 search results - page 199 / 692
» Abstracting Control
Sort
View
ICICS
2010
Springer
15 years 1 months ago
Fine-Grained Disclosure of Access Policies
Abstract. In open scenarios, where servers may receive requests to access their services from possibly unknown clients, access control is typically based on the evaluation of (cert...
Claudio Agostino Ardagna, Sabrina De Capitani di V...
112
Voted
VSTTE
2005
Springer
15 years 8 months ago
On the Formal Development of Safety-Critical Software
Abstract. We reflect on the formal development models applicable to embedded control systems in light of our experience with safety-critical applications from the aerospace domain....
Andy Galloway, Frantz Iwu, John A. McDermid, Ian T...
GI
2007
Springer
15 years 9 months ago
Ubiquitous Computing, Pervasive Computing, Ambient Intelligence - Surveillance and Control?
Abstract: Sowohl im praktischen Diskurs von Bürgerrechtsvertretern und Datenschützern wie auch in theoretisch ausgerichteten Debatten werden Ausdrücke wie Ubiquitous Computing, ...
Michael Nagenborg, Karsten Weber
SIGGRAPH
1990
ACM
15 years 7 months ago
Rapid controlled movement through a virtual 3D workspace
not abstract asymmetry: different sides looks different clumps different from "data objects" need grid structure, alignment [Design Guidelines for Landmarks to Support Na...
Jock D. Mackinlay, Stuart K. Card, George G. Rober...
CAV
2006
Springer
133views Hardware» more  CAV 2006»
15 years 7 months ago
Programs with Lists Are Counter Automata
Abstract. We address the verification problem of programs manipulating oneselector linked data structures. We propose a new automated approach for checking safety and termination f...
Ahmed Bouajjani, Marius Bozga, Peter Habermehl, Ra...