Sciweavers

1087 search results - page 71 / 218
» Achieving Distributed Control through Model Checking
Sort
View
SACMAT
2009
ACM
14 years 2 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
TIFS
2008
136views more  TIFS 2008»
13 years 7 months ago
Distributed Detection of Information Flows
Abstract--Distributed detection of information flows is considered in which traffic sensors at different locations of a network observe transmission epochs. The traffic sensors com...
Ting He, Lang Tong
INFOCOM
2006
IEEE
14 years 1 months ago
Utility-Optimal Medium Access Control: Reverse and Forward Engineering
— This paper analyzes and designs medium access control (MAC) protocols for wireless ad-hoc networks through the network utility maximization (NUM) framework. We first reverse-e...
Jang-Won Lee, Mung Chiang, A. Robert Calderbank
ICPR
2008
IEEE
14 years 2 months ago
Object boundary extraction using Active B-Snake Model
A new deformable model called Active B-Snake Model (ABM) is presented for object boundary extraction. First, an affine-invariant landmark point assignment strategy is proposed to ...
Yue Wang, Eam Khwang Teoh, Zujun Hou, Jian-Gang Wa...
ISORC
1999
IEEE
14 years 5 days ago
An Object-level Gateway Supporting Integrated-Property Quality of Service
As networks and the use of communication within applications continue to grow and find more uses, so too does the demand for more control and manageability of various "system...
Richard E. Schantz, John A. Zinky, David A. Karr, ...