Sciweavers

1011 search results - page 51 / 203
» Implementing Distributed Controllers for Systems with Priori...
Sort
View
132
Voted
SACMAT
2004
ACM
15 years 8 months ago
Using trust and risk in role-based access control policies
Emerging trust and risk management systems provide a framework for principals to determine whether they will exchange resources, without requiring a complete definition of their ...
Nathan Dimmock, András Belokosztolszki, Dav...
CDC
2009
IEEE
116views Control Systems» more  CDC 2009»
15 years 7 months ago
Translation control of a fleet circular formation of AUVs under finite communication range
— This work proposes a control algorithm to stabilize a circular formation of AUVs tracking a time-varying center. We also consider the problem of uniform distribution of all the...
Lara B. Arranz, Alexandre Seuret, Carlos Canudas d...
CSFW
2007
IEEE
15 years 9 months ago
Secure Implementations for Typed Session Abstractions
mplementations for Typed Session Abstractions Ricardo Corin1,2,3 Pierre-Malo Deni´elou1,2 C´edric Fournet1,2 Karthikeyan Bhargavan1,2 James Leifer1 1 MSR-INRIA Joint Centre 2 Mic...
Ricardo Corin, Pierre-Malo Deniélou, C&eacu...
123
Voted
COMCOM
1998
83views more  COMCOM 1998»
15 years 2 months ago
The design of the TAO real-time object request broker
Many real-time application domains can benefit from flexible and open distributed architectures, such as those defined by the CORBA specification. CORBA is an architecture for...
Douglas C. Schmidt, David L. Levine, Sumedh Mungee
164
Voted
CORR
2004
Springer
127views Education» more  CORR 2004»
15 years 2 months ago
Monitoring, Analyzing, and Controlling Internet-scale Systems with ACME
Analyzing and controlling large distributed services under a wide range of conditions is difficult. Yet these capabilities are essential to a number of important development and o...
David L. Oppenheimer, Vitaliy Vatkovskiy, Hakim We...