Sciweavers

3979 search results - page 82 / 796
» Wild control operators
Sort
View
JLP
2011
94views more  JLP 2011»
14 years 4 months ago
Permission to speak: A logic for access control and conformance
Formal languages for policy have been developed for access control and conformance checking. In this paper, we describe a formalism that combines features that have been developed...
Nikhil Dinesh, Aravind K. Joshi, Insup Lee, Oleg S...
ICRA
2002
IEEE
107views Robotics» more  ICRA 2002»
15 years 2 months ago
Deformation Control of Rheological Food Dough using a Forming Process Model
A new approach to the forming control using a forming process model of rheological food dough is presented. Manipulative operations of rheological objects can be found in many ind...
Shinichi Tokumoto, Shinichi Hirai
CINQ
2004
Springer
180views Database» more  CINQ 2004»
15 years 1 months ago
Interactivity, Scalability and Resource Control for Efficient KDD Support in DBMS
The conflict between resource consumption and query performance in the data mining context often has no satisfactory solution. This not only stands in sharp contrast to the need of...
Matthias Gimbel, Michael Klein, Peter C. Lockemann
CHI
2009
ACM
15 years 10 months ago
Multi-touch interface for controlling multiple mobile robots
We must give some form of a command to robots in order to have the robots do a complex task. An initial instruction is required even if they do their tasks autonomously. We theref...
Jun Kato, Daisuke Sakamoto, Masahiko Inami, Takeo ...
EDBT
2008
ACM
137views Database» more  EDBT 2008»
15 years 10 months ago
ACCOn: checking consistency of XML write-access control policies
XML access control policies involving updates may contain security flaws, here called inconsistencies, in which a forbidden operation may be simulated by performing a sequence of ...
Loreto Bravo, James Cheney, Irini Fundulaki