Sciweavers

7064 search results - page 89 / 1413
» From States to Histories
Sort
View
AOSD
2010
ACM
15 years 5 months ago
A permission system for secure AOP
The integration of third-party aspects into applications creates security challenges. Due to the intrusive impact of aspects, one cannot guarantee that the dynamic composition of ...
Wouter De Borger, Bart De Win, Bert Lagaisse, Wout...
ICRA
2010
IEEE
118views Robotics» more  ICRA 2010»
14 years 10 months ago
Tactile object class and internal state recognition for mobile manipulation
— Tactile information is valuable in determining properties of objects that are inaccessible from visual perception. In this work, we present a tactile perception strategy that a...
Sachin Chitta, Matthew Piccoli, Jürgen Sturm
ARCS
2004
Springer
15 years 5 months ago
Finite-State Modeling, Analysis and Testing of System Vulnerabilities
: Man-machine systems have several desirable properties, as to user friendliness, reliability, safety, security or other global system attributes. The potential for the lack, or br...
Fevzi Belli, Christof J. Budnik, Nimal Nissanke
AAAI
1998
15 years 1 months ago
Applying Online Search Techniques to Continuous-State Reinforcement Learning
In this paper, we describe methods for e ciently computing better solutions to control problems in continuous state spaces. We provide algorithms that exploit online search to boo...
Scott Davies, Andrew Y. Ng, Andrew W. Moore
COMPSAC
2002
IEEE
15 years 4 months ago
Expanding an Extended Finite State Machine to aid Testability
The problem of testing from an extended finite state machine (EFSM) is complicated by the presence of infeasible paths. This paper considers the problem of expanding an EFSM in o...
Robert M. Hierons, T.-H. Kim, Hasan Ural