Sciweavers

1183 search results - page 128 / 237
» On flow-sensitive security types
Sort
View
AGENTS
2000
Springer
15 years 8 months ago
The user interface as an agent environment
Theoretically motivated planning systems often make assumptions about their environments, in areas such as the predictability of action e ects, static behavior of the environment,...
Robert St. Amant, Luke S. Zettlemoyer
POPL
1999
ACM
15 years 8 months ago
A Core Calculus of Dependency
Notions of program dependency arise in many settings: security, partial evaluation, program slicing, and call-tracking. We argue that there is a central notion of dependency commo...
Martín Abadi, Anindya Banerjee, Nevin Heint...
AGENTS
1999
Springer
15 years 8 months ago
Where to Look? Automating Attending Behaviors of Virtual Human Characters
This research proposes a computational framework for generating visual attending behavior in an embodied simulated human agent. Such behaviors directly control eye and head motion...
Sonu Chopra-Khullar, Norman I. Badler
AGENTS
1998
Springer
15 years 8 months ago
A Market Architecture for Multi-Agent Contracting
We present a generalized market architecture that provides support for a variety of types of transactions, from simple buying and selling of goods and services to complex multi-age...
John Collins, Ben Youngdahl, Scott Jamison, Bamsha...
CSFW
1994
IEEE
15 years 8 months ago
One-Representative Safety Analysis in the Non-Monotonic Transform Model
We analyze the safety question for the Non-Monotonic Transform NMT model, an access control model that encompasses a wide variety of practical access control mechanisms. In genera...
Ravi S. Sandhu, Paul Ammann