Sciweavers

1497 search results - page 174 / 300
» Extended static checking
Sort
View
79
Voted
ACSD
2008
IEEE
108views Hardware» more  ACSD 2008»
15 years 7 months ago
PicNIc - Pi-calculus non-interference checker
PICNIC is a tool for verifying security properties of systems, namely non-interference properties of processes expressed as terms of the π-calculus with two security levels and d...
Silvia Crafa, Matteo Mio, Marino Miculan, Carla Pi...
92
Voted
CDC
2008
IEEE
15 years 7 months ago
Invertibility of nonlinear switched systems
— This article addresses the invertibility problem for switched nonlinear systems affine in controls. The problem is concerned with finding the input and switching signal uniqu...
Aneel Tanwani, Daniel Liberzon
132
Voted
ISORC
2008
IEEE
15 years 7 months ago
MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems
In this paper, a Role-based Access Control (RBAC) model is applied and extended to a multimedia version called Multi-Role Based Access Control (MRBAC), which can fully support the...
Na Zhao, Min Chen, Shu-Ching Chen, Mei-Ling Shyu
122
Voted
ASWEC
2007
IEEE
15 years 7 months ago
Timed Behavior Trees and Their Application to Verifying Real-Time Systems
Behavior Trees (BTs) are a graphical notation used for formalising functional requirements and have been successfully applied to several case studies. However, the notation curren...
Lars Grunske, Kirsten Winter, Robert Colvin
73
Voted
IROS
2007
IEEE
87views Robotics» more  IROS 2007»
15 years 7 months ago
Vision-based loop closing for delayed state robot mapping
— This paper shows results on outdoor vision-based loop closing for Simultaneous Localization and Mapping. Our experiments show that for loops of over 50m, the pose estimates mai...
Viorela Ila, Juan Andrade-Cetto, Rafael Valencia, ...