Sciweavers

3979 search results - page 116 / 796
» Wild control operators
Sort
View
HOTOS
2003
IEEE
15 years 3 months ago
Access Control to Information in Pervasive Computing Environments
Many types of information available in a pervasive computing environment, such as people location information, should be accessible only by a limited set of people. Some propertie...
Urs Hengartner, Peter Steenkiste
ACSAC
2002
IEEE
15 years 2 months ago
A Financial Institution's Legacy Mainframe Access Control System in Light of the Proposed NIST RBAC Standard
In this paper we describe a mainframe access control system (DENT) and its associated delegated administration tool (DSAS) that were used in a financial institution for over 20 y...
Andrew D. Marshall
CDC
2009
IEEE
143views Control Systems» more  CDC 2009»
15 years 2 months ago
Control interpretations of products in the Hopf algebra
Abstract— Families of differential operators, like those defining affine, generally nonlinear, control systems are known to have natural Hopf algebra structures. These provide ...
Matthias Kawski
HOTOS
1999
IEEE
15 years 2 months ago
Flexible Access Control using IPC Redirection
We present a mechanism for inter-process communication (IPC) redirection that enables efficient and flexible access control for micro-kernel systems. In such systems, services are...
Trent Jaeger, Kevin Elphinstone, Jochen Liedtke, V...
EAAI
2006
75views more  EAAI 2006»
14 years 10 months ago
Multi-agent framework based on smart sensors/actuators for machine tools control and monitoring
Throughout the history, the evolutions of the requirements for manufacturing equipments have depended on the changes in the customers' demands. Among the present trends in th...
Xavier Desforges, Bernard Archimède