Sciweavers

1222 search results - page 136 / 245
» Verifying a File System Implementation
Sort
View
98
Voted
TACS
1997
Springer
15 years 6 months ago
A Type-Theoretic Approach to Deadlock-Freedom of Asynchronous Systems
We present a type-based technique for the veri cation of deadlock-freedom in asynchronous concurrent systems. Our general approach is to start with a simple interaction category, i...
Samson Abramsky, Simon J. Gay, Rajagopal Nagarajan
127
Voted
TRUST
2009
Springer
15 years 9 months ago
Remote Attestation of Attribute Updates and Information Flows in a UCON System
UCON is a highly flexible and expressive usage control model which allows an object owner to specify detailed usage control policies to be evaluated on a remote platform. Assuranc...
Mohammad Nauman, Masoom Alam, Xinwen Zhang, Tamlee...
IROS
2008
IEEE
108views Robotics» more  IROS 2008»
15 years 9 months ago
Synchronous imitation control for biped robot based on wearable human motion analysis system
— To achieve accurate and efficient interaction with humans, robot training is indispensable to make robot cooperate with different host. We are focusing on development of a huma...
Tao Liu, H. Utsunomiya, Yoshio Inoue, Kyoko Shibat...
114
Voted
SEC
2008
15 years 4 months ago
Role Signatures for Access Control in Open Distributed Systems
Implementing access control efficiently and effectively in an open and distributed system is a challenging problem. One reason for this is that users requesting access to remote re...
Jason Crampton, Hoon Wei Lim
115
Voted
MVA
2002
15 years 2 months ago
Development of an Immersive Teleoperating System for Unmanned Helicopter
To collect the information on devastated districts, it is effective to use helicopters. However, the operation using manned helicopters costs a lot. It is expected that the use of...
Masanao Koeda, Yoshio Matsumoto, Tsukasa Ogasawara