Sciweavers

362 search results - page 61 / 73
» An access control model for simplifying constraint expressio...
Sort
View
CHI
2009
ACM
14 years 8 months ago
Can I borrow your phone?: understanding concerns when sharing mobile phones
Mobile phones are becoming increasingly personalized in terms of the data they store and the types of services they provide. At the same time, field studies have reported that the...
Amy K. Karlson, A. J. Bernheim Brush, Stuart E. Sc...
ICSE
1998
IEEE-ACM
13 years 11 months ago
Integrating Architecture Description Languages with a Standard Design Method
Software architecture descriptions are high-level models of software systems. Some researchers have proposed specialpurpose architectural notations that have a great deal of expre...
Jason E. Robbins, Nenad Medvidovic, David F. Redmi...
VMCAI
2009
Springer
14 years 2 months ago
Reducing Behavioural to Structural Properties of Programs with Procedures
Abstract There is an intimate link between program structure and behaviour. Exploiting this link to phrase program correctness problems in terms of the structural properties of a p...
Dilian Gurov, Marieke Huisman
CORR
2010
Springer
166views Education» more  CORR 2010»
13 years 7 months ago
A new closed-loop output error method for parameter identification of robot dynamics
Off-line robot dynamic identification methods are mostly based on the use of the inverse dynamic model, which is linear with respect to the dynamic parameters. This model is sample...
Maxime Gautier, Alexandre Janot, Pierre-Olivier Va...
CCS
2000
ACM
13 years 12 months ago
Implementing a distributed firewall
Conventional firewalls rely on topology restrictions and controlled network entry points to enforce traffic filtering. Furthermore, a firewall cannot filter traffic it does ...
Sotiris Ioannidis, Angelos D. Keromytis, Steven M....