Sciweavers

2838 search results - page 94 / 568
» Verifying Controlled Components
Sort
View
ICARCV
2006
IEEE
230views Robotics» more  ICARCV 2006»
14 years 3 months ago
A Biometric Approach to Linux Login Access Control
— Login access control refers to securing the entry point to a computing system. The login system is responsible for this service and must provide a number of tasks, the main tas...
Adam J. Gandossi, Wanquan Liu, Ronny Tjahyadi
ICPPW
2006
IEEE
14 years 3 months ago
Model Checking Control Communication of a FACTS Device
This paper concerns the design and verification of a realtime communication protocol for sensor data collection and processing between an embedded computer and a DSP. In such sys...
David A. Cape, Bruce M. McMillin, James K. Townsen...
CSFW
2005
IEEE
14 years 2 months ago
Achieving Information Flow Security through Precise Control of Effects
This paper advocates a novel approach to the construction of secure software: controlling information flow and maintaining integrity via monadic encapsulation of effects. This ap...
William L. Harrison, James Hook
ISCAS
2005
IEEE
163views Hardware» more  ISCAS 2005»
14 years 2 months ago
A reconfigurable crossbar switch with adaptive bandwidth control for networks-on-chip
— We propose a new crossbar switch structure with adaptive bandwidth control. In a complex SoC design, the proposed crossbar switch efficiently incorporates various IPs with diff...
Donghyun Kim, Kangmin Lee, Se-Joong Lee, Hoi-Jun Y...
ISCAS
2005
IEEE
161views Hardware» more  ISCAS 2005»
14 years 2 months ago
LMI-based neurocontroller for guaranteed cost control of uncertain time-delay systems
— This paper considers the application of the neural networks for the guaranteed cost control problem of discrete– time uncertain systems that have in both state and input dela...
Hiroaki Mukaidani, S. Sakaguchi, Toshio Tsuji