Sciweavers

2838 search results - page 145 / 568
» Verifying Controlled Components
Sort
View
EDBT
2006
ACM
177views Database» more  EDBT 2006»
14 years 10 months ago
Authorization-Transparent Access Control for XML Under the Non-Truman Model
In authorization-transparent access control, users formulate their queries against the database schema rather than against authorization views that transform and hide data. The Tru...
Alberto O. Mendelzon, Renée J. Miller, Yaro...
COMCOM
2008
153views more  COMCOM 2008»
13 years 10 months ago
Available bandwidth estimation and admission control for QoS routing in wireless mesh networks
This article presents an integrated admission control and routing mechanism for multi-rate wireless mesh networks. Admission control depends on precise estimates of available band...
Mesut Ali Ergin, Marco Gruteser, Lin Luo, Dipankar...
ICRA
2007
IEEE
154views Robotics» more  ICRA 2007»
14 years 4 months ago
Identification of the payload inertial parameters of industrial manipulators
— In this paper we present four methods for the identification of the inertial parameters of the load of a manipulator. The knowledge of the values of these parameters can be use...
Wisama Khalil, Maxime Gautier, Philippe Lemoine
CAI
2006
Springer
13 years 10 months ago
Formal Verification of Security Model Using SPR Tool
In this paper, formal verification methodologies and the SPR (Safety Problem Resolver) model checking tool are used for verifying a security model's safety. The SPR tool makes...
Il-Gon Kim, Miyoung Kang, Jin-Young Choi, Peter D....
IDMS
2001
Springer
116views Multimedia» more  IDMS 2001»
14 years 2 months ago
The Minimal Buffering Requirements of Congestion Controlled Interactive Multimedia Applications
This paper uses analysis and experiments to study the minimal buffering requirements of congestion controlled multimedia applications. Applications in the Internet must use congest...
Kang Li, Charles Krasic, Jonathan Walpole, Molly H...