Sciweavers

653 search results - page 74 / 131
» A Logic of Secure Systems and its Application to Trusted Com...
Sort
View
VLDB
2007
ACM
155views Database» more  VLDB 2007»
14 years 9 months ago
Answering Aggregation Queries in a Secure System Model
As more sensitive data is captured in electronic form, security becomes more and more important. Data encryption is the main technique for achieving security. While in the past en...
Tingjian Ge, Stanley B. Zdonik
WSCG
2004
158views more  WSCG 2004»
13 years 10 months ago
Robot Hand Visual Tracking Using an Adaptive Fuzzy Logic Controller
This paper presents an algorithm to track an industrial robot hand during its movement. Based on acquired image and knowing the robot hand model, the pose is obtained. This inform...
Carlos Pérez, Óscar Reinoso, Maria A...
NSPW
1998
ACM
14 years 1 months ago
Meta Objects for Access Control: a Formal Model for Role-Based Principals
Object-based programming is becoming more and more popular and is currently conquering the world of distributed programming models. In object-based systems access control is often...
Thomas Riechmann, Franz J. Hauck
AAAI
2000
13 years 10 months ago
DATALOG with Constraints - An Answer-Set Programming System
Answer-set programming (ASP) has emerged recently as a viable programming paradigm well attuned to search problems in AI, constraint satisfaction and combinatorics. Propositional ...
Deborah East, Miroslaw Truszczynski
JSS
2008
136views more  JSS 2008»
13 years 9 months ago
Specification, decomposition and agent synthesis for situation-aware service-based systems
Service-based systems are distributed computing systems with the major advantage of enabling rapid composition of distributed applications, such as collaborative research and deve...
Stephen S. Yau, Haishan Gong, Dazhi Huang, Wei Gao...