Sciweavers

724 search results - page 51 / 145
» Implementing Execution Controls in Unix
Sort
View
ISW
2005
Springer
14 years 2 months ago
Evaluating Access Control Policies Through Model Checking
We present a model-checking algorithm which can be used to evaluate access control policies, and a tool which implements it. The evaluation includes not only assessing whether the ...
Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev
AAI
1999
147views more  AAI 1999»
13 years 9 months ago
Animated Agents for Procedural Training in Virtual Reality: Perception, Cognition, and Motor Control
This paper describes Steve, an animated agent that helps students learn to perform physical, procedural tasks. The student and Steve cohabit a three-dimensional, simulated mock-up...
Jeff Rickel, W. Lewis Johnson
ICPR
2000
IEEE
14 years 10 months ago
Visual Attention Control for Nuclear Power Plant Inspection
Industrial inspection robots, which are to move around a nuclear power plant and carry out inspection tasks, must follow a given route while observing static and dynamic features ...
Nobuyuki Kita
ICCD
2006
IEEE
103views Hardware» more  ICCD 2006»
14 years 6 months ago
Architectural Support for Run-Time Validation of Control Flow Transfer
—Current micro-architecture blindly uses the address in the program counter to fetch and execute instructions without validating its legitimacy. Whenever this blind-folded instru...
Yixin Shi, Sean Dempsey, Gyungho Lee
FCCM
2000
IEEE
144views VLSI» more  FCCM 2000»
14 years 1 months ago
Automatic Synthesis of Data Storage and Control Structures for FPGA-Based Computing Engines
Mapping computations written in high-level programming languages to FPGA-based computing engines requires programmers to generate the datapath responsible for the core of the comp...
Pedro C. Diniz, Joonseok Park