Sciweavers

5339 search results - page 130 / 1068
» Controllable Delay-Insensitive Processes
Sort
View
115
Voted
ADC
2008
Springer
114views Database» more  ADC 2008»
15 years 2 months ago
An Integrated Access Control for Securely Querying and Updating XML Data
Many existing access controls use node filtering or querying rewriting techniques. These techniques require rather time-consuming processes such as parsing, labeling, pruning and/...
Maggie Duong, Yanchun Zhang
126
Voted
DATE
2005
IEEE
154views Hardware» more  DATE 2005»
15 years 6 months ago
Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring
— Security is emerging as an important concern in embedded system design. The security of embedded systems is often compromised due to vulnerabilities in “trusted” software t...
Divya Arora, Srivaths Ravi, Anand Raghunathan, Nir...
115
Voted
SEC
2004
15 years 2 months ago
Interactive Access Control for Web Services
Business Processes for Web Services (BPEL4WS) are the new paradigms for lightweight enterprise integration. They cross organizational boundaries and are provided by entities that s...
Hristo Koshutanski, Fabio Massacci
89
Voted
WSC
1998
15 years 2 months ago
Modeling at the Machine-Control Level Using Discrete Event Simulation (DES)
Simulation at the machine-control level plays an important role in designing machine controls and operational specifications. Recently, there has been a considerable amount of wor...
Raid Al-Aomar, Daniel Cook
RAS
2006
86views more  RAS 2006»
15 years 20 days ago
Using cellular automata and gradients to control self-reconfiguration
Self-reconfigurable robots are built from modules, which are autonomously able to change the way they are connected. Such a robot can, through this self-reconfiguration process, c...
Kasper Støy