Sciweavers

759 search results - page 102 / 152
» What Can Be Implemented Anonymously
Sort
View
RTCSA
2005
IEEE
14 years 3 months ago
Model Checking Timed Systems with Priorities
Priorities are used to resolve conflicts such as in resource sharing and in safety designs. The use of priorities has become indispensable in real-time system design such as in s...
Pao-Ann Hsiung, Shang-Wei Lin
ISW
2005
Springer
14 years 3 months ago
Evaluating Access Control Policies Through Model Checking
We present a model-checking algorithm which can be used to evaluate access control policies, and a tool which implements it. The evaluation includes not only assessing whether the ...
Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev
OOPSLA
2005
Springer
14 years 3 months ago
Subtext: uncovering the simplicity of programming
Representing programs as text strings makes programming harder then it has to be. The source text of a program is far removed from its behavior. Bridging this conceptual gulf is w...
Jonathan Edwards
OTM
2005
Springer
14 years 3 months ago
OWL-Based User Preference and Behavior Routine Ontology for Ubiquitous System
In ubiquitous computing, behavior routine learning is the process of mining the context-aware data to find interesting rules on the user’s behavior, while preference learning tri...
Kim Anh Pham Ngoc, Young-Koo Lee, Sungyoung Lee
SGAI
2005
Springer
14 years 3 months ago
A Camera-Direction Dependent Visual-Motor Coordinate Transformation for a Visually Guided Neural Robot
Objects of interest are represented in the brain simultaneously in different frames of reference. Knowing the positions of one’s head and eyes, for example, one can compute the...
Cornelius Weber, David Muse, Mark Elshaw, Stefan W...