Sciweavers

202 search results - page 3 / 41
» Composing and decomposing systems under security properties
Sort
View
ESORICS
2004
Springer
14 years 25 days ago
An Algebra for Composing Enterprise Privacy Policies
Abstract. Enterprise privacy enforcement allows enterprises to internally enforce a privacy policy that the enterprise has decided to comply to. To facilitate the compliance with d...
Michael Backes, Markus Dürmuth, Rainer Steinw...
DAGSTUHL
2006
13 years 8 months ago
A Framework for Analyzing Composition of Security Aspects
The methodology of aspect-oriented software engineering has been proposed to factor out concerns that are orthogonal to the core functionality of a system. In particular, this is a...
Jorge Fox, Jan Jürjens
TC
1998
13 years 7 months ago
A Metaobject Architecture for Fault-Tolerant Distributed Systems: The FRIENDS Approach
—The FRIENDS system developed at LAAS-CNRS is a metalevel architecture providing libraries of metaobjects for fault tolerance, secure communication, and group-based distributed a...
Jean-Charles Fabre, Tanguy Pérennou
MVA
1992
140views Computer Vision» more  MVA 1992»
13 years 8 months ago
Background Image Generation by Cooperative Parallel Processing Under Severe Outdoor Condition
This paper proposes a system for the background image generation by cooperative parallel processingunder the severe outdoor environmental conditions, which are ever changing in na...
Katsunori Inoue, Wonchan Seo
ICRA
2010
IEEE
154views Robotics» more  ICRA 2010»
13 years 6 months ago
Design and analysis of a soft mobile robot composed of multiple thermally activated joints driven by a single actuator
— Soft robotic systems have applications in industrial, medical, and security applications. Many applications require these robots to be small and lightweight. One challenge in d...
Nadia Cheng, Genya Ishigami, Stephan Hawthorne, Ha...