We introduce the first approach that can actively control multiple hardware intellectual property (IP) cores used in an integrated circuit (IC). The IP rights owner(s) can remotel...
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
We analyze the computational complexity of kCFA, a hierarchy of control flow analyses that determine which functions may be applied at a given call-site. This hierarchy specifies ...
The field of multi-robot coordination, specifically robot formation control, is rapidly expanding, with many applications proposed. In our previous work, we considered the problem...
Autonomousmobile robots need to detect potential failures reliably and react appropriately. Dueto uncertainties about the robots and their environment,it is extremelydifficult to ...