Sciweavers

628 search results - page 51 / 126
» A Practical Approach to Measuring Assurance
Sort
View
OSDI
2000
ACM
13 years 9 months ago
End-to-End Authorization
Many boundaries impede the flow of authorization information, forcing applications that span those boundaries into hop-by-hop approaches to authorization. We present a unified app...
Jon Howell, David Kotz
SAC
2010
ACM
14 years 29 days ago
Mining interesting sets and rules in relational databases
In this paper we propose a new and elegant approach toward the generalization of frequent itemset mining to the multirelational case. We define relational itemsets that contain i...
Bart Goethals, Wim Le Page, Michael Mampaey
ICRA
2003
IEEE
112views Robotics» more  ICRA 2003»
14 years 28 days ago
Cartesian impedance control of redundant robots: recent results with the DLR-light-weight-arms
— This paper addresses the problem of impedance control for flexible joint robots based on a singular perturbation approach. Some aspects of the impedance controller, which turn...
Alin Albu-Schäffer, Christian Ott, Udo Frese,...
ELPUB
2007
ACM
13 years 11 months ago
Openness in Higher Education: Open Source, Open Standards, Open Access
For national advisory services in the UK (UKOLN, CETIS, and OSS Watch), varieties of openness (open source software, open standards, and open access to research publications and d...
Brian Kelly, Scott Wilson, Randy Metcalfe
DSN
2004
IEEE
13 years 11 months ago
Verifying Web Applications Using Bounded Model Checking
The authors describe the use of bounded model checking (BMC) for verifying Web application code. Vulnerable sections of code are patched automatically with runtime guards, allowin...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...