Sciweavers

80 search results - page 8 / 16
» Application of Fractional Calculus in the Control of Heat Sy...
Sort
View
TASE
2007
IEEE
14 years 2 months ago
Constraint-Based Policy Negotiation and Enforcement for Telco Services
Telco services are evolving under several aspects: for instance, services may combine different telecommunication features (messaging, multi-media, etc.) and may be activated and...
Maria Grazia Buscemi, Laura Ferrari, Corrado Moiso...
ENTCS
2006
115views more  ENTCS 2006»
13 years 8 months ago
Distributed Reactive XML
XML-centric models of computation have been proposed as an answer to the demand for interoperability, heterogeneity and openness in coordination models. We present a prototype imp...
Thomas T. Hildebrandt, Henning Niss, Martin Olsen,...
GI
2004
Springer
14 years 1 months ago
Towards Using the Full Human Potential in Games and Virtual Environments
: Humans have complex sensory and control capabilities. Only a few are used in standard games and virtual environments. Examples of games using interfaces beyond mouse, keyboard an...
Steffi Beckhaus
SP
2003
IEEE
14 years 1 months ago
Using Memory Errors to Attack a Virtual Machine
We present an experimental study showing that soft memory errors can lead to serious security vulnerabilities in Java and .NET virtual machines, or in any system that relies on ty...
Sudhakar Govindavajhala, Andrew W. Appel
ACSD
2008
IEEE
108views Hardware» more  ACSD 2008»
14 years 3 months ago
PicNIc - Pi-calculus non-interference checker
PICNIC is a tool for verifying security properties of systems, namely non-interference properties of processes expressed as terms of the π-calculus with two security levels and d...
Silvia Crafa, Matteo Mio, Marino Miculan, Carla Pi...