Sciweavers

365 search results - page 55 / 73
» Types for Safe Locking
Sort
View
HASKELL
2006
ACM
14 years 2 months ago
User-level transactional programming in Haskell
Correct handling of concurrently accessed external resources is a demanding problem in programming. The standard approaches rely on database transactions or concurrency mechanisms...
Peter Thiemann
ADBIS
2005
Springer
163views Database» more  ADBIS 2005»
14 years 2 months ago
XML Databases and Beyond - Plenty of Architectural Challenges Ahead
A key observation is that the invariants in database management determine the mapping steps of the supporting architecture. Referring to the multi-layered architecture of record-or...
Theo Härder
ICRA
2003
IEEE
100views Robotics» more  ICRA 2003»
14 years 2 months ago
New finishing system for metallic molds using a hybrid motion/force control
In this paper, a finishing system with a mounted abrasive tool is proposed for finishing of metallic molds. The shape of the mounted abrasive tool is a ball-end type. When a metal...
Fusaomi Nagata, Keigo Watanabe, Yukihiro Kusumoto,...
ICRA
1999
IEEE
89views Robotics» more  ICRA 1999»
14 years 1 months ago
Failure Tolerant Teleoperation of a Kinematically Redundant Manipulator: An Experimental Study
Teleoperated robots in harsh environments have a significant likelihood of failures. It has been shown in previous work that a common type of failure such as that of a joint "...
Manish Goel, Anthony A. Maciejewski, Venkataramana...
CCS
2008
ACM
13 years 11 months ago
Reconsidering physical key secrecy: teleduplication via optical decoding
The access control provided by a physical lock is based on the assumption that the information content of the corresponding key is private -- that duplication should require eithe...
Benjamin Laxton, Kai Wang, Stefan Savage