Sciweavers

1925 search results - page 164 / 385
» Dynamic Typing
Sort
View
ICRA
2000
IEEE
85views Robotics» more  ICRA 2000»
15 years 9 months ago
Neural Network Controller for Constrained Robot Manipulators
In this paper, a neural network controller for constrained robot manipulators is presented. A feedforward neural network is used to adaptively compensate for the uncertainties in ...
Shenghai Hu, Marcelo H. Ang, Hariharan Krishnan
124
Voted
ICMCS
1997
IEEE
74views Multimedia» more  ICMCS 1997»
15 years 9 months ago
Link Management Framework for Hyper-Media Documents
This paper presents a framework for link management within hyper-media documents. The framework includes: (1) an object-oriented document architecture with a consistent interface ...
Dragos-Anton Manolescu, Klara Nahrstedt
CSFW
2007
IEEE
15 years 9 months ago
Automaton-based Confidentiality Monitoring of Concurrent Programs
Noninterference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checking of noni...
Gurvan Le Guernic
ASIAN
2006
Springer
153views Algorithms» more  ASIAN 2006»
15 years 9 months ago
Automata-Based Confidentiality Monitoring
Abstract Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checkin...
Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jen...
ESOP
2006
Springer
15 years 8 months ago
Linear Regions Are All You Need
Abstract. The type-and-effects system of the Tofte-Talpin region calculus makes it possible to safely reclaim objects without a garbage collector. However, it requires that regions...
Matthew Fluet, Greg Morrisett, Amal J. Ahmed