Sciweavers

303 search results - page 51 / 61
» Context-Sensitive Call Control Using Constraints and Rules
Sort
View
ATAL
2008
Springer
13 years 11 months ago
Sensing-based shape formation on modular multi-robot systems: a theoretical study
This paper presents a theoretical study of decentralized control for sensing-based shape formation on modular multirobot systems, where the desired shape is specified in terms of ...
Chih-Han Yu, Radhika Nagpal
SACMAT
2009
ACM
14 years 3 months ago
xDomain: cross-border proofs of access
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...
BMCBI
2007
106views more  BMCBI 2007»
13 years 9 months ago
Constructing a meaningful evolutionary average at the phylogenetic center of mass
Background: As a consequence of the evolutionary process, data collected from related species tend to be similar. This similarity by descent can obscure subtler signals in the dat...
Eric A. Stone, Arend Sidow
ACSAC
2006
IEEE
14 years 3 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
EUROPKI
2004
Springer
14 years 2 months ago
Mobile Qualified Electronic Signatures and Certification on Demand
Despite a legal framework being in place for several years, the market share of qualified electronic signatures is disappointingly low. Mobile Signatures provide a new and promisin...
Heiko Rossnagel