Sciweavers

314 search results - page 28 / 63
» Concurrently Decomposable Constraint Systems
Sort
View
CSE
2009
IEEE
15 years 6 months ago
A Framework for Enforcing Constrained RBAC Policies
—Constraints are an important part of role-based access control policies. The safety or security of a system is maintained by enforcing constraints that are specified in the pol...
Jason Crampton, Hemanth Khambhammettu
ISQED
2003
IEEE
85views Hardware» more  ISQED 2003»
15 years 5 months ago
Static Pin Mapping and SOC Test Scheduling for Cores with Multiple Test Sets
An algorithm for mapping core terminals to System-On-a-Chip (SOC) I/O pins and scheduling tests in order to achieve costefficient concurrent test for core-based designs is present...
Yu Huang, Wu-Tung Cheng, Chien-Chung Tsai, Nilanja...
ICRA
2003
IEEE
122views Robotics» more  ICRA 2003»
15 years 5 months ago
Complementarity formulation for multi-fingered hand manipulation with rolling and sliding contacts
— We propose a novel complementarity model for a general three-dimensional manipulation system with rolling and sliding contacts to solve the forward dynamics problem. The key id...
Masahito Yashima, Hideya Yamaguchi
RTCSA
2003
IEEE
15 years 5 months ago
Towards Aspectual Component-Based Development of Real-Time Systems
Increasing complexity of real-time systems, and demands for enabling their configurability and tailorability are strong motivations for applying new software engineering principle...
Aleksandra Tesanovic, Dag Nyström, Jörge...
TASE
2007
IEEE
15 years 6 months ago
Constraint-Based Policy Negotiation and Enforcement for Telco Services
Telco services are evolving under several aspects: for instance, services may combine different telecommunication features (messaging, multi-media, etc.) and may be activated and...
Maria Grazia Buscemi, Laura Ferrari, Corrado Moiso...