Sciweavers

488 search results - page 56 / 98
» Derivation of Java Monitors
Sort
View
PLDI
2005
ACM
15 years 5 months ago
Composing security policies with polymer
We introduce a language and system that supports definition and composition of complex run-time security policies for Java applications. Our policies are comprised of two sorts o...
Lujo Bauer, Jay Ligatti, David Walker
LCTRTS
2000
Springer
15 years 3 months ago
Approximation of Worst-Case Execution Time for Preemptive Multitasking Systems
The control system of many complex mechatronic products requires for each task the Worst Case Execution Time (WCET), which is needed for the scheduler's admission tests and su...
Matteo Corti, Roberto Brega, Thomas R. Gross
ICCV
2003
IEEE
16 years 1 months ago
Gaze Manipulation for One-to-one Teleconferencing
A new algorithm is proposed for novel view generation in one-toone teleconferencing applications. Given the video streams acquired by two cameras placed on either side of a comput...
Antonio Criminisi, Jamie Shotton, Andrew Blake, Ph...
ICPR
2008
IEEE
16 years 1 months ago
Selecting relevant features for human motion recognition
Recently, there is a growing interest in automatic recognition of human motion for applications, such as humanoid robots, human activity monitoring, and surveillance. In this pape...
Dirk Gehrig, Tanja Schultz
MDM
2007
Springer
209views Communications» more  MDM 2007»
15 years 6 months ago
Parallelized Simulated Annealing for Model Updating in Ad-Hoc Wireless Sensing Networks
The engineering community has recently begun to adopt wireless sensing technologies for use in many sensing applications. These low-cost sensors provide an optimal setting for den...
Andrew T. Zimmerman, Jerome P. Lynch