Sciweavers

303 search results - page 10 / 61
» Context-Sensitive Call Control Using Constraints and Rules
Sort
View
ICRA
2009
IEEE
178views Robotics» more  ICRA 2009»
13 years 5 months ago
A riemannian-geometry approach for dynamics and control of object manipulation under constraints
A Riemannian-geometry approach for control and stabilization of dynamics of object manipulation under holonomic or non-holonomic (but Pfaffian) constraints is presented. First, pos...
Suguru Arimoto, Morio Yoshida, Masahiro Sekimoto, ...
IROS
2006
IEEE
111views Robotics» more  IROS 2006»
14 years 1 months ago
A Qualitative Visual Servoing to ensure the Visibility Constraint
— This paper describes an original control law called qualitative servoing. The particularity of this method is that no specific desired value is specified for the visual featu...
Anthony Remazeilles, Nicolas Mansard, Franç...
KR
2000
Springer
13 years 11 months ago
Reduction rules and universal variables for first order tableaux and DPLL
Recent experimental results have shown that the strength of resolution, the propositional DPLL procedure, the KSAT procedure for description logics, or related tableau-like implem...
Fabio Massacci
ECOOPW
1998
Springer
13 years 12 months ago
Workshop Report - ECOOP'98 Workshop 7: Tools and Environments for Business Rules
This workshop focussed on the requirements for tools and environments that support business rules in an object-oriented setting and attempted to provide an overview of possible tec...
Kim Mens, Roel Wuyts, Dirk Bontridder, Alain Grijs...
CSFW
2010
IEEE
13 years 11 months ago
Constraining Credential Usage in Logic-Based Access Control
—Authorization logics allow concise specification of flexible access-control policies, and are the basis for logic-based access-control systems. In such systems, resource owner...
Lujo Bauer, Limin Jia, Divya Sharma