Sciweavers

475 search results - page 17 / 95
» Reasoning About the Transfer of Control
Sort
View
CEC
2009
IEEE
14 years 3 days ago
Automatic system identification based on coevolution of models and tests
In evolutionary robotics, controllers are often designed in simulation, then transferred onto the real system. Nevertheless, when no accurate model is available, controller transfe...
Sylvain Koos, Jean-Baptiste Mouret, Stéphan...
VTC
2007
IEEE
14 years 3 months ago
Mobility-Aware Data Management on Mobile Wireless Networks
— We design a Mobility-aware DAta management (MoDA) scheme for mobile ad hoc networks (MANETs) composed by mobile nodes such as urban pedestrians and vehicles. By fully utilizing...
Akiko Yamasaki, Hirozumi Yamaguchi, Shinji Kusumot...
BIRTHDAY
2005
Springer
14 years 2 months ago
Compiled Labelled Deductive Systems for Access Control
This paper proposes a Compiled Labelled Deductive System, called ACCLDS, for reasoning about role-based access control in distributed systems, which builds upon Massacci’s tablea...
Krysia Broda, Alessandra Russo
FSEN
2009
Springer
14 years 3 months ago
Program Logics for Sequential Higher-Order Control
We introduce a Hoare logic for higher-order functional languages with control operators such as callcc. The key idea is to build the assertion language and proof rules around an e...
Martin Berger
PKC
2009
Springer
210views Cryptology» more  PKC 2009»
14 years 9 months ago
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
In this work, we consider the task of allowing a content provider to enforce complex access control policies on oblivious protocols conducted with anonymous users. As our primary ...
Scott E. Coull, Matthew Green, Susan Hohenberger