Sciweavers

191 search results - page 25 / 39
» Specifying and Reasoning About Dynamic Access-Control Polici...
Sort
View
IJCAI
1997
13 years 9 months ago
Change, Change, Change: Three Approaches
We consider the frame problem, that is, char­ acterizing the assumption that properties tend to persist over time. We show that there are at least three distinct assumptions that...
Tom Costello
GLOBECOM
2010
IEEE
13 years 5 months ago
Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware
Proof of a user's identity is not always a sufficient means for making an authorization decision. In an increasing set of circumstances, knowledge of physical location provide...
Patrick Traynor, Joshua Schiffman, Thomas F. La Po...
NFM
2011
252views Formal Methods» more  NFM 2011»
13 years 2 months ago
Call Invariants
Program verifiers based on first-order theorem provers model the program heap as a collection of mutable maps. In such verifiers, preserving unmodified facts about the heap acr...
Shuvendu K. Lahiri, Shaz Qadeer
AAAI
1996
13 years 9 months ago
Trajectory Constraints in Qualitative Simulation
We present a method for specifying temporal constraints on trajectories of dynamical systems and enforcing them during qualitative simulation. This capability can be used to focus...
Giorgio Brajnik, Daniel J. Clancy
ECAI
1998
Springer
13 years 12 months ago
Transparent, Flexible, and Resource-adaptive Image Processing for Autonomous Service Robots
This paper describes SRIPPs, structured reactive image processing plans, that are tailored for the needs of autonomous service robots. SRIPPs are implemented on top of a modular, d...
Michael Beetz, Tom Arbuckle, Armin B. Cremers, M. ...