Sciweavers

724 search results - page 51 / 145
» Implementing Execution Controls in Unix
Sort
View
ISW
2005
Springer
15 years 9 months ago
Evaluating Access Control Policies Through Model Checking
We present a model-checking algorithm which can be used to evaluate access control policies, and a tool which implements it. The evaluation includes not only assessing whether the ...
Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev
130
Voted
AAI
1999
147views more  AAI 1999»
15 years 3 months ago
Animated Agents for Procedural Training in Virtual Reality: Perception, Cognition, and Motor Control
This paper describes Steve, an animated agent that helps students learn to perform physical, procedural tasks. The student and Steve cohabit a three-dimensional, simulated mock-up...
Jeff Rickel, W. Lewis Johnson
124
Voted
ICPR
2000
IEEE
16 years 5 months ago
Visual Attention Control for Nuclear Power Plant Inspection
Industrial inspection robots, which are to move around a nuclear power plant and carry out inspection tasks, must follow a given route while observing static and dynamic features ...
Nobuyuki Kita
ICCD
2006
IEEE
103views Hardware» more  ICCD 2006»
16 years 1 months ago
Architectural Support for Run-Time Validation of Control Flow Transfer
—Current micro-architecture blindly uses the address in the program counter to fetch and execute instructions without validating its legitimacy. Whenever this blind-folded instru...
Yixin Shi, Sean Dempsey, Gyungho Lee
FCCM
2000
IEEE
144views VLSI» more  FCCM 2000»
15 years 8 months ago
Automatic Synthesis of Data Storage and Control Structures for FPGA-Based Computing Engines
Mapping computations written in high-level programming languages to FPGA-based computing engines requires programmers to generate the datapath responsible for the core of the comp...
Pedro C. Diniz, Joonseok Park