Sciweavers

733 search results - page 131 / 147
» A Logic Programming View of Authorization in Distributed Sys...
Sort
View
LOGCOM
1998
178views more  LOGCOM 1998»
13 years 6 months ago
Applying the Mu-Calculus in Planning and Reasoning about Action
Planning algorithms have traditionally been geared toward achievement goals in single-agent environments. Such algorithms essentially produce plans to reach one of a specified se...
Munindar P. Singh
NETGAMES
2004
ACM
14 years 5 days ago
Realizing bullet time effect in multiplayer games with local perception filters
Local perception filters exploit the limitations of human perception to reduce the effects of network latency in multiplayer computer games. Because they allow temporal distorti...
Jouni Smed, Henrik Niinisalo, Harri Hakonen
ICSE
2005
IEEE-ACM
14 years 6 months ago
Automatic generation and maintenance of correct spreadsheets
Existing spreadsheet systems allow users to change cells arbitrarily, which is a major source of spreadsheet errors. We propose a system that prevents errors in spreadsheets by re...
Martin Erwig, Robin Abraham, Irene Cooperstein, St...
CCS
2009
ACM
14 years 7 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
EMSOFT
2005
Springer
14 years 8 days ago
Passive mid-stream monitoring of real-time properties
Passive monitoring or testing of complex systems and networks running in the field can provide valuable insights into their behavior in actual environments of use. In certain con...
Lalita Jategaonkar Jagadeesan, Ramesh Viswanathan