Sciweavers

467 search results - page 26 / 94
» Simple Mechanical Control Systems with Constraints and Symme...
Sort
View
NDSS
2003
IEEE
14 years 29 days ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet
CODASPY
2012
12 years 3 months ago
Comparison-based encryption for fine-grained access control in clouds
Access control is one of the most important security mechanisms in cloud computing. However, there has been little work that explores various comparison-based constraints for regu...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu, H...
RTSS
1998
IEEE
13 years 12 months ago
Elastic Task Model for Adaptive Rate Control
An increasing number of real-time applications, related to multimedia and adaptive control systems, require greater flexibility than classical real-time theory usually permits. In...
Giorgio C. Buttazzo, Giuseppe Lipari, Luca Abeni
COOPIS
1996
IEEE
13 years 12 months ago
Integrity Constraint Checking in Federated Databases
A federated database is comprised of multiple interconnected database systems that primarily operate independently but cooperate to a certain extent. Global integrity constraints c...
Paul W. P. J. Grefen, Jennifer Widom
AAAI
2010
13 years 9 months ago
Biologically-Inspired Control for Multi-Agent Self-Adaptive Tasks
Decentralized agent groups typically require complex mechanisms to accomplish coordinated tasks. In contrast, biological systems can achieve intelligent group behaviors with each ...
Chih-Han Yu, Radhika Nagpal