Sciweavers

6555 search results - page 1044 / 1311
» Secure attribute-based systems
Sort
View
ANSOFT
2002
171views more  ANSOFT 2002»
15 years 3 months ago
OPM/Web - Object-Process Methodology for Developing Web Applications
Web applications can be classified as hybrids between hypermedia and information systems. They have a relatively simple distributed architecture from the user viewpoint, but a comp...
Iris Reinhartz-Berger, Dov Dori, Shmuel Katz
135
Voted
FAC
2010
107views more  FAC 2010»
15 years 2 months ago
Algebra and logic for access control
: © Algebra and logic for access control Matthew Collinson, David Pym HP Laboratories HPL-2008-75R1 Access control, process algebra, bunched Logic; systems modelling The access co...
Matthew Collinson, David J. Pym
122
Voted
ICRA
2010
IEEE
154views Robotics» more  ICRA 2010»
15 years 2 months ago
Design and analysis of a soft mobile robot composed of multiple thermally activated joints driven by a single actuator
— Soft robotic systems have applications in industrial, medical, and security applications. Many applications require these robots to be small and lightweight. One challenge in d...
Nadia Cheng, Genya Ishigami, Stephan Hawthorne, Ha...
INFOCOM
2010
IEEE
15 years 2 months ago
Safeguarding Data Delivery by Decoupling Path Propagation and Adoption
—False routing announcements are a serious security problem, which can lead to widespread service disruptions in the Internet. A number of detection systems have been proposed an...
Mingui Zhang, Bin Liu, Beichuan Zhang
129
Voted
SOCIALCOM
2010
15 years 1 months ago
Managed Mission Assurance - Concept, Methodology and Runtime Support
We interpret "mission assurance" to mean the guarantee that Mission Essential Functionality (MEF) provided by an information system is continued despite partial failures ...
Partha Pratim Pal, Kurt Rohloff, Michael Atighetch...
« Prev « First page 1044 / 1311 Last » Next »