Sciweavers

811 search results - page 57 / 163
» Refactoring Using Type Constraints
Sort
View
FOAL
2009
ACM
14 years 3 months ago
A machine-checked model of safe composition
Programs of a software product line can be synthesized by composing features which implement some unit of program functionality. In most product lines, only some combination of fe...
Benjamin Delaware, William R. Cook, Don S. Batory
ICRA
2008
IEEE
109views Robotics» more  ICRA 2008»
14 years 3 months ago
A forearm actuation unit for an upper extremity prosthesis
Abstract— This paper presents the design of a 14 degree-ofmotion forearm actuation unit for an upper extremity prosthesis. The forearm utilizes pneumatic type actuators which use...
Thomas J. Withrow, Xiangrong Shen, Jason E. Mitche...
ICCS
2009
Springer
14 years 3 months ago
Access Policy Design Supported by FCA Methods
Role Based Access Control (RBAC) is a methodology for providing users in an IT system specific permissions like write or read to t abstracts from specific users and binds permiss...
Frithjof Dau, Martin Knechtel
EOR
2008
159views more  EOR 2008»
13 years 8 months ago
A survey on the continuous nonlinear resource allocation problem
Our problem of interest consists of minimizing a separable, convex and differentiable function over a convex set, defined by bounds on the variables and an explicit constraint des...
Michael Patriksson
CORR
2007
Springer
97views Education» more  CORR 2007»
13 years 8 months ago
Unfolding Restricted Convex Caps
This paper details an algorithm for unfolding a class of convex polyhedra, where each polyhedron in the class consists of a convex cap over a rectangular base, with several restri...
Joseph O'Rourke