Sciweavers

5196 search results - page 146 / 1040
» State of Application Assessment
Sort
View
137
Voted
CCS
2007
ACM
15 years 9 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder
EICS
2009
ACM
15 years 8 months ago
StateStream: a developer-centric approach towards unifying interaction models and architecture
Complex and dynamic interaction behaviors in applications such as Virtual Reality (VR) systems are difficult to design and develop. Reasons for this include the complexity and lim...
Gerwin de Haan, Frits H. Post
GLOBECOM
2008
IEEE
15 years 10 months ago
Delay-Energy Tradeoffs in Wireless Ad-Hoc Networks with Partial Channel State Information
Given a wireless network where each link undergoes small-scale (Rayleigh) fading, we consider the problem of routing a message from a source node to a target node while minimizing...
Matthew Brand, Andreas F. Molisch
161
Voted
DSN
2003
IEEE
15 years 9 months ago
A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities
This paper combines an analysis of data on security vulnerabilities (published in Bugtraq database) and a focused source-code examination to develop a finite state machine (FSM) m...
Shuo Chen, Zbigniew Kalbarczyk, Jun Xu, Ravishanka...
ICRA
2009
IEEE
106views Robotics» more  ICRA 2009»
15 years 10 months ago
Simultaneous local and global state estimation for robotic navigation
— Recent applications of robotics often demand two types of spatial awareness: 1) A fine-grained description of the robot’s immediate surroundings for obstacle avoidance and p...
David C. Moore, Albert S. Huang, Matthew Walter, E...