Sciweavers

241 search results - page 28 / 49
» Implementation of a discretionary access control model for s...
Sort
View
OTM
2010
Springer
13 years 7 months ago
Generic Algorithms for Consistency Checking of Mutual-Exclusion and Binding Constraints in a Business Process Context
In this paper, we present generic algorithms to ensure the consistency of mutual-exclusion and binding constraints in a business process context. We repeatedly identified the need...
Mark Strembeck, Jan Mendling
OSDI
2006
ACM
14 years 9 months ago
XFI: Software Guards for System Address Spaces
XFI is a comprehensive protection system that offers both flexible access control and fundamental integrity guarantees, at any privilege level and even for legacy code in commodit...
Úlfar Erlingsson, George C. Necula, Mart&ia...
SOSP
2007
ACM
14 years 5 months ago
Information flow control for standard OS abstractions
ion Flow Control for Standard OS Abstractions Maxwell Krohn Alexander Yip Micah Brodsky Natan Cliffer M. Frans Kaashoek Eddie Kohler† Robert Morris MIT CSAIL †UCLA http://flum...
Maxwell N. Krohn, Alexander Yip, Micah Z. Brodsky,...
ISQED
2009
IEEE
117views Hardware» more  ISQED 2009»
14 years 3 months ago
Adaptive voltage controlled nanoelectronic addressing for yield, accuracy and resolution
An outstanding challenge for realizing nanoelectronic systems is nano-interface design, i.e., how to precisely access a nanoscale wire in an array for communication between a nano...
Bao Liu
ICARCV
2002
IEEE
185views Robotics» more  ICARCV 2002»
14 years 1 months ago
Evolving cooperative robotic behaviour using distributed genetic programming
Cooperative robotic systems provide design and implementation challenges that are not easy to solve. This paper describes a parallel implementation for evolving cooperative roboti...
Chris H. Messom, Matthew G. Walker