Sciweavers

8874 search results - page 1672 / 1775
» A New Implementation of Automath
Sort
View
120
Voted
ICSE
2010
IEEE-ACM
15 years 8 months ago
Test generation through programming in UDITA
We present an approach for describing tests using nondeterministic test generation programs. To write such programs, we introduce UDITA, a Java-based language with non-determinist...
Milos Gligoric, Tihomir Gvero, Vilas Jagannath, Sa...
CDC
2009
IEEE
111views Control Systems» more  CDC 2009»
15 years 8 months ago
Quotient method for controlling the acrobot
— This paper describes a two-sweep control design method to stabilize the acrobot, an input-affine under-actuated system, at the upper equilibrium point. In the forward sweep, t...
Sudarsandhari Shibani Willson, Philippe Müllh...
129
Voted
EICS
2009
ACM
15 years 8 months ago
Adapting ubicomp software and its evaluation
We describe work in progress on tools and infrastructure to support adaptive component-based software for mobile devices— in our case, Apple iPhones. Our high level aim is ‘de...
Malcolm Hall, Marek Bell, Alistair Morrison, Stuar...
SAC
2009
ACM
15 years 8 months ago
Spam decisions on gray e-mail using personalized ontologies
E-mail is one of the most common communication methods among people on the Internet. However, the increase of e-mail misuse/abuse has resulted in an increasing volume of spam e-ma...
Seongwook Youn, Dennis McLeod
SACMAT
2009
ACM
15 years 8 months ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
« Prev « First page 1672 / 1775 Last » Next »