Sciweavers

3128 search results - page 531 / 626
» Finite element method
Sort
View
EUROSEC
2009
ACM
15 years 10 months ago
QuanTM: a quantitative trust management system
Quantitative Trust Management (QTM) provides a dynamic interpretation of authorization policies for access control decisions based on upon evolving reputations of the entities inv...
Andrew G. West, Adam J. Aviv, Jian Chang, Vinayak ...
125
Voted
FOSSACS
2009
Springer
15 years 10 months ago
Cryptographic Protocol Composition via the Authentication Tests
Although cryptographic protocols are typically analyzed in isolation, they are used in combinations. If a protocol was analyzed alone and shown to meet some security goals, will it...
Joshua D. Guttman
90
Voted
ICRA
2009
IEEE
108views Robotics» more  ICRA 2009»
15 years 10 months ago
Control of hopping speed and height over unknown rough terrain using a single actuator
— We present a method for controlling the forward speed and the apex height of a one-legged hopping robot over rough terrain, using a single actuator located at the robot hip. Th...
Nicholas Cherouvim, Evangelos Papadopoulos
ICSM
2009
IEEE
15 years 10 months ago
BCC: Enhancing code completion for better API usability
Nowadays, programmers spend much of their workday dealing with code libraries and frameworks that are bloated with APIs. One common way of interacting with APIs is through Code Co...
David M. Pletcher, Daqing Hou
INFOCOM
2009
IEEE
15 years 10 months ago
Hyperbolic Embedding and Routing for Dynamic Graphs
—We propose an embedding and routing scheme for arbitrary network connectivity graphs, based on greedy routing and utilizing virtual node coordinates. In dynamic multihop packet-...
Andrej Cvetkovski, Mark Crovella