Sciweavers

3979 search results - page 80 / 796
» Wild control operators
Sort
View
JHSN
2006
100views more  JHSN 2006»
14 years 9 months ago
Reconfiguring Role Based Access Control policies using risk semantics
We present a refined model for Role Based Access Control policies and define a risk measure for the model, which expresses elements of the operational, combinatorial and conflict ...
Benjamin Aziz, Simon N. Foley, John Herbert, Garre...
ICRA
2005
IEEE
153views Robotics» more  ICRA 2005»
15 years 3 months ago
YARA: A Software Framework Enhancing Service Robot Dependability
— This paper focuses on the role of real-time operation support in mobile robot control architectures for service applications. We show that a control architecture with integrate...
Stefano Caselli, Francesco Monica, Monica Reggiani
SOSP
2007
ACM
15 years 6 months ago
Integrating concurrency control and energy management in device drivers
Energy management is a critical concern in wireless sensornets. Despite its importance, sensor network operating systems today provide minimal energy management support, requiring...
Kevin Klues, Vlado Handziski, Chenyang Lu, Adam Wo...
TARK
2009
Springer
15 years 4 months ago
A logic of propositional control for truthful implementations
We introduce a logic designed to support reasoning about social choice functions. The logic includes operators to capture strategic ability, and operators to capture agent prefere...
Nicolas Troquard, Wiebe van der Hoek, Michael Wool...
DAC
1994
ACM
15 years 2 months ago
Incorporating Speculative Execution in Exact Control-Dependent Scheduling
- This paper describes a symbolic formulation that allows incorporation of speculative operation execution (preexecution) in an exact control-dependent scheduling of arbitrary forw...
Ivan P. Radivojevic, Forrest Brewer