Sciweavers

519 search results - page 62 / 104
» Control flow obfuscation with information flow tracking
Sort
View
RAS
2006
97views more  RAS 2006»
13 years 8 months ago
Visuo-motor learning for face-to-face pass between heterogeneous humanoids
Humanoid behavior generation is one of the most formidable issues due to its complicated structure with many degrees of freedom. This paper proposes a controller for a humanoid to...
Masaki Ogino, Masaaki Kikuchi, Minoru Asada
MIDDLEWARE
2007
Springer
14 years 3 months ago
A service-oriented middleware for context-aware applications
Context awareness has emerged as an important element in distributed computing. It offers mechanisms that allow applications to be aware of their environment and enable these appl...
Luiz Olavo Bonino da Silva Santos, Remco Poortinga...
CCS
2006
ACM
14 years 17 days ago
Application security support in the operating system kernel
Application security is typically coded in the application. In kernelSec, we are investigating mechanisms to implement application security in an operating system kernel. The mech...
Manigandan Radhakrishnan, Jon A. Solworth
COOPIS
2000
IEEE
14 years 13 days ago
Workflow Modeling Using Proclets
The focus of traditional workflow management systems is on control flow within one process definition, that describes how a single case (i.e., workflow instance) is handled in isol...
Wil M. P. van der Aalst, Paulo Barthelmess, Claren...
MICRO
2009
IEEE
129views Hardware» more  MICRO 2009»
14 years 3 months ago
Execution leases: a hardware-supported mechanism for enforcing strong non-interference
High assurance systems such as those found in aircraft controls and the financial industry are often required to handle a mix of tasks where some are niceties (such as the contro...
Mohit Tiwari, Xun Li, Hassan M. G. Wassel, Frederi...