Sciweavers

SMC
2010
IEEE
187views Control Systems» more  SMC 2010»
13 years 5 months ago
Estimation of psychological stress levels using Facial Expression Spatial Charts
—This paper presents a new framework to describe individual facial expression spaces, particularly addressing the dynamic diversity of facial expressions that appear as an exclam...
Hirokazu Madokoro, Kazuhito Sato
SMC
2010
IEEE
151views Control Systems» more  SMC 2010»
13 years 5 months ago
A situated approach to enterprise architecture management
Abstract—Today’s enterprises are confronted with a challenging environment that demands continuous transformations. Globalized markets, disruptive technological innovations, an...
Sabine Buckl, Christian M. Schweda, Florian Matthe...
SCL
2010
79views more  SCL 2010»
13 years 5 months ago
Teixeira singularities in 3D switched feedback control systems
This paper is concerned with the analysis of a singularity that can occur in threedimensional discontinuous feedback control systems. The singularity is the two-fold – a tangenc...
A. Colombo, Mario di Bernardo, Enric Fossas, M. R....
SACMAT
2010
ACM
13 years 5 months ago
Role mining based on weights
Role mining from the existing permissions has been widely applied to aid the process of migrating to an RBAC system. While all permissions are treated evenly in previous approache...
Xiaopu Ma, Ruixuan Li, Zhengding Lu
SACMAT
2010
ACM
13 years 5 months ago
Enforcing spatial constraints for mobile RBAC systems
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the administrative and security advantages of RBAC with the dynamic nature of mobile and...
Michael S. Kirkpatrick, Elisa Bertino
SACMAT
2010
ACM
13 years 5 months ago
An architecture for enforcing end-to-end access control over web applications
The web is now being used as a general platform for hosting distributed applications like wikis, bulletin board messaging systems and collaborative editing environments. Data from...
Boniface Hicks, Sandra Rueda, Dave King 0002, Thom...
RP
2010
Springer
146views Control Systems» more  RP 2010»
13 years 5 months ago
Depth Boundedness in Multiset Rewriting Systems with Name Binding
Abstract. In this paper we consider ν-MSR, a formalism that combines the two main existing approaches for multiset rewriting, namely MSR and CMRS. In ν-MSR we rewrite multisets o...
Fernando Rosa Velardo
RP
2010
Springer
126views Control Systems» more  RP 2010»
13 years 5 months ago
Lossy Counter Machines Decidability Cheat Sheet
Abstract. Lossy counter machines (LCM’s) are a variant of Minsky counter machines based on weak (or unreliable) counters in the sense that they can decrease nondeterministically ...
Philippe Schnoebelen
RP
2010
Springer
133views Control Systems» more  RP 2010»
13 years 5 months ago
Behavioral Cartography of Timed Automata
We aim at finding a set of timing parameters for which a given timed automaton has a “good” behavior. We present here a novel approach based on the decomposition of the parame...
Étienne André, Laurent Fribourg