Sciweavers

623 search results - page 69 / 125
» Velocity-Dependent Dynamic Manipulability
Sort
View
CSFW
2007
IEEE
15 years 7 months ago
Automaton-based Confidentiality Monitoring of Concurrent Programs
Noninterference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checking of noni...
Gurvan Le Guernic
ASIAN
2006
Springer
153views Algorithms» more  ASIAN 2006»
15 years 7 months ago
Automata-Based Confidentiality Monitoring
Abstract Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checkin...
Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jen...
CLIMA
2007
15 years 5 months ago
EVOLP: Tranformation-Based Semantics
Over the years, Logic Programming has proved to be a good and natural tool for expressing, querying and manipulating explicit knowledge in many areas of computer science. However, ...
Martin Slota, João Leite
GRAPHICSINTERFACE
2003
15 years 5 months ago
Interactive Deformation Using Modal Analysis with Constraints
Modal analysis provides a powerful tool for efficiently simulating the behavior of deformable objects. This paper shows how manipulation, collision, and other constraints may be ...
Kris K. Hauser, Chen Shen, James F. O'Brien
103
Voted
IJON
2007
73views more  IJON 2007»
15 years 3 months ago
A biophysical model of short-term plasticity at the calyx of Held
The calyx of Held is a giant glutamatergic synapse in the auditory system and displays multiple forms of short-term facilitation and depression. This study presents a detailed mod...
Matthias H. Hennig, Michael Postlethwaite, Ian D. ...