Sciweavers

314 search results - page 28 / 63
» Concurrently Decomposable Constraint Systems
Sort
View
CSE
2009
IEEE
14 years 2 months ago
A Framework for Enforcing Constrained RBAC Policies
—Constraints are an important part of role-based access control policies. The safety or security of a system is maintained by enforcing constraints that are specified in the pol...
Jason Crampton, Hemanth Khambhammettu
ISQED
2003
IEEE
85views Hardware» more  ISQED 2003»
14 years 28 days ago
Static Pin Mapping and SOC Test Scheduling for Cores with Multiple Test Sets
An algorithm for mapping core terminals to System-On-a-Chip (SOC) I/O pins and scheduling tests in order to achieve costefficient concurrent test for core-based designs is present...
Yu Huang, Wu-Tung Cheng, Chien-Chung Tsai, Nilanja...
ICRA
2003
IEEE
122views Robotics» more  ICRA 2003»
14 years 28 days ago
Complementarity formulation for multi-fingered hand manipulation with rolling and sliding contacts
— We propose a novel complementarity model for a general three-dimensional manipulation system with rolling and sliding contacts to solve the forward dynamics problem. The key id...
Masahito Yashima, Hideya Yamaguchi
RTCSA
2003
IEEE
14 years 28 days ago
Towards Aspectual Component-Based Development of Real-Time Systems
Increasing complexity of real-time systems, and demands for enabling their configurability and tailorability are strong motivations for applying new software engineering principle...
Aleksandra Tesanovic, Dag Nyström, Jörge...
TASE
2007
IEEE
14 years 1 months ago
Constraint-Based Policy Negotiation and Enforcement for Telco Services
Telco services are evolving under several aspects: for instance, services may combine different telecommunication features (messaging, multi-media, etc.) and may be activated and...
Maria Grazia Buscemi, Laura Ferrari, Corrado Moiso...