Sciweavers

276 search results - page 8 / 56
» Defining and computing accessibility radius
Sort
View
XMLSEC
2003
ACM
14 years 28 days ago
First experiences using XACML for access control in distributed systems
Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as com...
Markus Lorch, Seth Proctor, Rebekah Lepro, Dennis ...
PODS
2004
ACM
98views Database» more  PODS 2004»
14 years 7 months ago
Processing First-Order Queries under Limited Access Patterns
We study the problem of answering queries over sources with limited access patterns. Given a first-order query Q, the problem is to decide whether there is an equivalent query whi...
Alan Nash, Bertram Ludäscher
MONET
2006
107views more  MONET 2006»
13 years 7 months ago
Utilization and fairness in spectrum assignment for opportunistic spectrum access
The Open Spectrum approach to spectrum access can achieve near-optimal utilization by allowing devices to sense and utilize available spectrum opportunistically. However, a naive d...
Chunyi Peng, Haitao Zheng, Ben Y. Zhao
STTT
2008
134views more  STTT 2008»
13 years 7 months ago
Automated verification of access control policies using a SAT solver
Abstract. Managing access control policies in modern computer systems can be challenging and error-prone. Combining multiple disparate access policies can introduce unintended cons...
Graham Hughes, Tevfik Bultan
ICRA
1999
IEEE
94views Robotics» more  ICRA 1999»
13 years 12 months ago
Computing Parallel-Jaw Grips
In this paper we propose a new model for gripping parts with an industrial parallel-jaw gripper. In contrast to many previous models, we use two grip points and define candidate g...
Gordon Smith, Eric Lee, Kenneth Y. Goldberg, Karl-...