Sciweavers

1925 search results - page 164 / 385
» Dynamic Typing
Sort
View
ICRA
2000
IEEE
85views Robotics» more  ICRA 2000»
14 years 1 months ago
Neural Network Controller for Constrained Robot Manipulators
In this paper, a neural network controller for constrained robot manipulators is presented. A feedforward neural network is used to adaptively compensate for the uncertainties in ...
Shenghai Hu, Marcelo H. Ang, Hariharan Krishnan
ICMCS
1997
IEEE
74views Multimedia» more  ICMCS 1997»
14 years 1 months ago
Link Management Framework for Hyper-Media Documents
This paper presents a framework for link management within hyper-media documents. The framework includes: (1) an object-oriented document architecture with a consistent interface ...
Dragos-Anton Manolescu, Klara Nahrstedt
CSFW
2007
IEEE
14 years 1 months ago
Automaton-based Confidentiality Monitoring of Concurrent Programs
Noninterference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checking of noni...
Gurvan Le Guernic
ASIAN
2006
Springer
153views Algorithms» more  ASIAN 2006»
14 years 1 months ago
Automata-Based Confidentiality Monitoring
Abstract Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checkin...
Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jen...
ESOP
2006
Springer
14 years 28 days ago
Linear Regions Are All You Need
Abstract. The type-and-effects system of the Tofte-Talpin region calculus makes it possible to safely reclaim objects without a garbage collector. However, it requires that regions...
Matthew Fluet, Greg Morrisett, Amal J. Ahmed