Sciweavers

164 search results - page 18 / 33
» Audit-based compliance control
Sort
View
ICICS
1997
Springer
13 years 11 months ago
Enforcing traceability in software
Traceability is a property of a communications protocol that ensures that the origin and/or destination of messages can be identified. The aims of this paper are twofold. Firstly t...
Colin Boyd
ICRA
1993
IEEE
106views Robotics» more  ICRA 1993»
13 years 11 months ago
Compliant Control of Threaded Fastener Insertion
Controlled compliance and accommodation matrix techniques are considered for robust insertion of threaded fasteners. Errors in translational positioning are shown to be easily cor...
Edward J. Nicolson, Ronald S. Fearing
HICSS
2010
IEEE
155views Biometrics» more  HICSS 2010»
14 years 2 months ago
Experiences Validating the Access Policy Tool in Industrial Settings
—The Access Policy Tool (APT) analyzes the firewall configuration in an enterprise network for compliance with global access policy, e.g., such as describes the industry’s be...
David M. Nicol, William H. Sanders, Mouna Seri, Sa...
SOCASE
2009
Springer
14 years 2 months ago
Business Modeling via Commitments
Abstract. Existing computer science approaches to business modeling offer lowstractions such as data and control flows, which fail to capture the business intent underlying the in...
Pankaj R. Telang, Munindar P. Singh
ICC
2008
IEEE
117views Communications» more  ICC 2008»
14 years 1 months ago
Proactive Power Optimization of Sensor Networks
—We propose a reduced-complexity genetic algorithm for dynamic deployment of resource constrained multi-hop mobile sensor networks. The goal of this paper is to achieve optimal c...
Rahul Khanna, Huaping Liu, Hsiao-Hwa Chen