Sciweavers

1622 search results - page 164 / 325
» Autonomous Mobile Programs
Sort
View
CCR
1999
110views more  CCR 1999»
13 years 10 months ago
Independent active program representation using ASN. 1
act Syntax Notation One (ASN.1) can be used as a common substrate for representing active programs. An active networking framework, using ASN.1 whereby any active network solution ...
Brad Williamson, Craig Farrell
JCS
2010
122views more  JCS 2010»
13 years 8 months ago
Provably correct inline monitoring for multithreaded Java-like programs
Inline reference monitoring is a powerful technique to enforce security policies on untrusted programs. The security-by-contract paradigm proposed by the EU FP6 S3 MS project uses...
Mads Dam, Bart Jacobs 0002, Andreas Lundblad, Fran...
AE
2007
Springer
14 years 4 months ago
Automatic Design of Vision-Based Obstacle Avoidance Controllers Using Genetic Programming
The work presented in this paper is part of the development of a robotic system able to learn context dependent visual clues to navigate in its environment. We focus on the obstacl...
Renaud Barate, Antoine Manzanera
ATAL
2000
Springer
14 years 2 months ago
High-Level Robot Control through Logic
This paper presents a programmable logic-based agent control system that interleaves planning, plan execution and perception. In this system, a program is a collection of logical f...
Murray Shanahan, Mark Witkowski
DMS
2010
147views Multimedia» more  DMS 2010»
13 years 8 months ago
Towards Security-aware Program Visualization for Analyzing In-lined Reference Monitors
In-lined Reference Monitoring frameworks are an emerging technology for enforcing security policies over untrusted, mobile, binary code. However, formulating correct policy specifi...
Aditi Patwardhan, Kevin W. Hamlen, Kendra Cooper