Sciweavers

229 search results - page 16 / 46
» Set Covering Problems in Role-Based Access Control
Sort
View
LREC
2010
191views Education» more  LREC 2010»
13 years 9 months ago
Spatial Role Labeling: Task Definition and Annotation Scheme
One of the essential functions of natural language is to talk about spatial relationships between objects. Linguistic constructs can express highly complex, relational structures ...
Parisa KordJamshidi, Martijn van Otterlo, Marie-Fr...
ISSS
1996
IEEE
169views Hardware» more  ISSS 1996»
13 years 12 months ago
The Use of a Virtual Instruction Set for the Software Synthesis of HW/SW Embedded Systems
The application range of the embedded computing is going to cover the majority of the market products spanning from consumer electronic, automotive, telecom and process control. F...
Alessandro Balboni, William Fornaciari, M. Vincenz...
HIPEAC
2010
Springer
13 years 9 months ago
Virtual Ways: Efficient Coherence for Architecturally Visible Storage in Automatic Instruction Set Extensions
Abstract. Customizable processors augmented with application-specific Instruction Set Extensions (ISEs) have begun to gain traction in recent years. The most effective ISEs include...
Theo Kluter, Samuel Burri, Philip Brisk, Edoardo C...
IEEEARES
2007
IEEE
14 years 2 months ago
CSP-Based Firewall Rule Set Diagnosis using Security Policies
The most important part of a firewall configuration process is the implementation of a security policy by a security administrator. However, this security policy is not designed b...
Sergio Pozo, Rafael Ceballos, Rafael M. Gasca
CDC
2009
IEEE
135views Control Systems» more  CDC 2009»
13 years 5 months ago
Continuous control of hybrid automata with imperfect mode information assuming separation between state estimation and control
Abstract-- The safety control problem for hybrid automata with imperfect mode information and continuous control is addressed. When the controller does not have access to the mode ...
Rajeev Verma, Domitilla Del Vecchio