Sciweavers

8658 search results - page 110 / 1732
» Models of Command and Control
Sort
View
NTMS
2008
IEEE
14 years 2 months ago
Time and Location Based Services with Access Control
—We propose an access control model that extends RBAC (Role-Based Access Control) to take time and location into account, and use term rewriting systems to specify access control...
Clara Bertolissi, Maribel Fernández
CBMS
2006
IEEE
14 years 2 months ago
How to Break Access Control in a Controlled Manner
The Electronic Medical Record (EMR) integrates heterogeneous information within a Healthcare Institution stressing the need for security and access control. The Biostatistics and ...
Ana Ferreira, Ricardo João Cruz Correia, Lu...
MIRRORBOT
2005
Springer
157views Robotics» more  MIRRORBOT 2005»
14 years 1 months ago
LARP, Biped Robotics Conceived as Human Modelling
This paper presents a human-like control of an innovative biped robot. The robot presents a total of twelve degrees of freedom; each joint resemble the functionalities of the human...
Umberto Scarfogliero, Michele Folgheraiter, Giusep...
ENTCS
2008
83views more  ENTCS 2008»
13 years 8 months ago
Controlling Control Flow in Web Applications
Control flow is often key problem in current web applications. For example, using the back button gives a POSTDATA error, using multiple windows books the wrong hotel, and sending...
Robin Message, Alan Mycroft
JISE
1998
106views more  JISE 1998»
13 years 7 months ago
Control / Data-Flow Analysis for VHDL Semantic Extraction
straction reduces the number of states necessary to perform formal verification while maintaining the functionality of the original model with respect to ifications to be verified....
Yee-Wing Hsieh, Steven P. Levitan