Sciweavers

467 search results - page 26 / 94
» Simple Mechanical Control Systems with Constraints and Symme...
Sort
View
NDSS
2003
IEEE
15 years 5 months ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet
CODASPY
2012
13 years 7 months ago
Comparison-based encryption for fine-grained access control in clouds
Access control is one of the most important security mechanisms in cloud computing. However, there has been little work that explores various comparison-based constraints for regu...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu, H...
87
Voted
RTSS
1998
IEEE
15 years 4 months ago
Elastic Task Model for Adaptive Rate Control
An increasing number of real-time applications, related to multimedia and adaptive control systems, require greater flexibility than classical real-time theory usually permits. In...
Giorgio C. Buttazzo, Giuseppe Lipari, Luca Abeni
COOPIS
1996
IEEE
15 years 3 months ago
Integrity Constraint Checking in Federated Databases
A federated database is comprised of multiple interconnected database systems that primarily operate independently but cooperate to a certain extent. Global integrity constraints c...
Paul W. P. J. Grefen, Jennifer Widom
AAAI
2010
15 years 1 months ago
Biologically-Inspired Control for Multi-Agent Self-Adaptive Tasks
Decentralized agent groups typically require complex mechanisms to accomplish coordinated tasks. In contrast, biological systems can achieve intelligent group behaviors with each ...
Chih-Han Yu, Radhika Nagpal