Sciweavers

86 search results - page 8 / 18
» A control strategy for operating unknown constrained mechani...
Sort
View
CN
2010
90views more  CN 2010»
13 years 7 months ago
The price of security in wireless sensor networks
With the increased application of wireless sensor networks (WSNs) to military, commercial, and home environments, securing the data in the network has become a critical issue. Seve...
Jongdeog Lee, Krasimira Kapitanova, Sang Hyuk Son
IWCC
1999
IEEE
14 years 14 hour ago
Nomad: A Scalable Operating System for Clusters of Uni and Multiprocessors
The recent improvements in workstation and interconnection network performance have popularized the clusters of off-the-shelf workstations. However, the usefulness of these cluste...
Eduardo Pinheiro, Ricardo Bianchini
SP
2009
IEEE
155views Security Privacy» more  SP 2009»
14 years 2 months ago
A Logic of Secure Systems and its Application to Trusted Computing
We present a logic for reasoning about properties of secure systems. The logic is built around a concurrent programming language with constructs for modeling machines with shared ...
Anupam Datta, Jason Franklin, Deepak Garg, Dilsun ...
AOSD
2008
ACM
13 years 9 months ago
Expressive scoping of dynamically-deployed aspects
Several aspect languages and frameworks have recognized the need for dynamic deployment of aspects. However, they do not provide sufficiently expressive means to precisely specify...
Éric Tanter
ILP
2005
Springer
14 years 1 months ago
Guiding Inference Through Relational Reinforcement Learning
Abstract. Reasoning plays a central role in intelligent systems that operate in complex situations that involve time constraints. In this paper, we present the Adaptive Logic Inter...
Nima Asgharbeygi, Negin Nejati, Pat Langley, Sachi...