Sciweavers

427 search results - page 29 / 86
» Policies: Giving Users Control over Calls
Sort
View
SRDS
2003
IEEE
14 years 3 months ago
Pesto Flavoured Security
We demonstrate that symmetric-key cryptography can be used for both read and write access control. One-time write access can be granted by handing over an encryption key, and our ...
Feike W. Dillema, Tage Stabell-Kulø
CD
2004
Springer
14 years 3 months ago
JPloy: User-Centric Deployment Support in a Component Platform
Based on a vision that, in the future, applications will be flexibly built out of small-grained components, we argue that current technologies do not adequately support component d...
Chris Lüer, André van der Hoek
SIGGRAPH
2010
ACM
14 years 2 months ago
Gesture controllers
We introduce gesture controllers, a method for animating the body language of avatars engaged in live spoken conversation. A gesture controller is an optimal-policy controller tha...
Sergey Levine, Philipp Krähenbühl, Sebastian Thr...
IANDC
2008
140views more  IANDC 2008»
13 years 10 months ago
Information flow security in Boundary Ambients
A variant of the Mobile Ambient calculus, called Boundary Ambients, is introduced, supporting the modelling of multi-level security policies. Ambients that may guarantee to proper...
Chiara Braghin, Agostino Cortesi, Riccardo Focardi
AAAI
1996
13 years 11 months ago
Evolution-Based Discovery of Hierarchical Behaviors
Procedural representations of control policies have two advantages when facing the scale-up problem in learning tasks. First they are implicit, with potential for inductive genera...
Justinian P. Rosca, Dana H. Ballard