Sciweavers

423 search results - page 73 / 85
» A Logical Approach to Dynamic Role-Based Access Control
Sort
View
KR
1992
Springer
14 years 25 days ago
Abductive Plan Recognition and Diagnosis: A Comprehensive Empirical Evaluation
While it has been realized for quite some time within AI that abduction is a general model of explanation for a variety of tasks, there have been no empirical investigations into ...
Hwee Tou Ng, Raymond J. Mooney
RAS
2007
150views more  RAS 2007»
13 years 8 months ago
Evolution of fuzzy behaviors for multi-robotic system
In a multi-robotic system, robots interact with each other in a dynamically changing environment. The robots need to be intelligent both at the individual and group levels. In thi...
Prahlad Vadakkepat, Xiao Peng, Boon Kiat Quek, Ton...
CSFW
2011
IEEE
12 years 8 months ago
Local Memory via Layout Randomization
—Randomization is used in computer security as a tool to introduce unpredictability into the software infrastructure. In this paper, we study the use of randomization to achieve ...
Radha Jagadeesan, Corin Pitcher, Julian Rathke, Ja...
SIGSOFT
2003
ACM
14 years 9 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
VLDB
2002
ACM
122views Database» more  VLDB 2002»
13 years 8 months ago
Lightweight Flexible Isolation for Language-based Extensible Systems
Safe programming languages encourage the development of dynamically extensible systems, such as extensible Web servers and mobile agent platforms. Although protection is of utmost...
Laurent Daynès, Grzegorz Czajkowski