— We present an approach to motion planning for highly articulated systems that aims to ensure robust execution by augmenting the planning process to reason about the robot’s a...
Philipp Michel, Christian Scheurer, James J. Kuffn...
The concept of interoperability of data and model as presented in this paper is viewed as being very useful for implementing variety of future applications related to power system...
Mladen Kezunovic, Santiago Grijalva, Papiya Dutta,...
Abstract. Access control languages which support administrative controls, and thus allow the ordinary permissions of a system to change, have traditionally been constructed with ...
Certified code is a general mechanism for enforcing security properties. In this paradigm, untrusted mobile code carries annotations that allow a host to verify its trustworthine...
Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the av...