Sciweavers

4498 search results - page 674 / 900
» How to Invent Functions
Sort
View
CCS
2008
ACM
15 years 6 months ago
Enforcing authorization policies using transactional memory introspection
Correct enforcement of authorization policies is a difficult task, especially for multi-threaded software. Even in carefully-reviewed code, unauthorized access may be possible in ...
Arnar Birgisson, Mohan Dhawan, Úlfar Erling...
ISARCS
2010
164views Hardware» more  ISARCS 2010»
15 years 6 months ago
Increasing the Resilience of Critical SCADA Systems Using Peer-to-Peer Overlays
Abstract. Supervisory Control and Data Acquisition (SCADA) systems are migrating from isolated to highly-interconnected large scale architectures. In addition, these systems are in...
Daniel Germanus, Abdelmajid Khelil, Neeraj Suri
CDC
2008
IEEE
117views Control Systems» more  CDC 2008»
15 years 6 months ago
Swing-up control for n-link planar robot with single passive joint using the notion of virtual composite links
In this paper, we concern a swing-up control problem for an n-link revolute planar robot with any one of the joint being a passive joint. The goal of this study is to design and an...
Xin Xin, Jin-Hua She, Taiga Yamasaki
CDC
2008
IEEE
120views Control Systems» more  CDC 2008»
15 years 6 months ago
Left invertibility of discrete systems with finite inputs and quantized output
Abstract-- The aim of this paper is to address left invertibility for dynamical systems with inputs and outputs in discrete sets. We study systems that evolve in discrete time with...
Nevio Dubbini, Benedetto Piccoli, Antonio Bicchi
DEON
2006
Springer
15 years 6 months ago
A Logical Architecture of a Normative System
Abstract. Logical architectures combine several logics into a more complex logical system. In this paper we study a logical architecture using input/output operations corresponding...
Guido Boella, Leendert W. N. van der Torre