Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jon Howell is active.

Publication


Featured researches published by Jon Howell.


international conference on robotics and automation | 2000

Practical mobile robot self-localization

Jon Howell; Bruce Randall Donald

A map-making robot integrates accumulated sensor data into a data structure that can be used for future localization or planning operations. Localization is the process of determining the robots location within its environment. This paper describes experiments in which a robot simultaneously makes a map and localizes to that map. The map is a collection of tangent vectors constructed from stored sonar readings localized to a series of estimated poses. The vectors retain sensed surface normal information to improve accuracy. The localization scheme is a Hough transform into a space described by the robots current sonar scan. The Hough transform finds a best fit in the presence of both sporadic sensor noise and discretization error.


european symposium on research in computer security | 2000

A Formal Semantics for SPKI

Jon Howell; David Kotz

We extend the logic and semantics of authorization due to Abadi, Lampson, et al. to support restricted delegation. Our formal model provides a simple interpretation for the variety of constructs in the Simple Public Key Infrastructure (SPKI), and lends intuition about possible extensions. We discuss both extensions that our semantics supports and extensions that it cautions against.


international symposium on experimental robotics | 1999

Experiments with Desktop Mobile Manipulators

Matthew T. Mason; Dinesh K. Pai; Daniela Rus; Jon Howell; Lee R. Taylor; Michael A. Erdmann

This paper describes our work on Desktop Robotics. The main focus is two robots that locomote and manipulate paper on a desktop. One robot uses wheels for both manipulation and locomotion. The other robot uses wheels for locomotion and a sticky foot to lift and carry pieces of paper. We outline the goals of our work on desktop robotics, describe the design of the robots built so far, present experimental data, and outline some of the issues for future work.


workshop on hot topics in operating systems | 1999

Hey, you got your compiler in my operating system!

Jon Howell; Mark H. Montague

Several operating systems projects revolve around moving functionality above or below the kernel red line to increase flexibility or performance. We describe how a general model of partial evaluation encompasses this trend. The operating systems community should not be content with a single interface between applications and the operating system, even if that interface allows extension below the red line; we contend that partial evaluation will be most effective when it is free of that arbitrary static interface. Extending partial evaluation from the language level down to the hardware provides a consistent, global framework for application support.


Operating Systems Review | 2000

Restricted delegation: seamlessly spanning administrative boundaries

Jon Howell; David Kotz

We have extended Lampsons calculus for access control to model restricted delegation. Basing a security model on a formal semantics and logic helps us understand its subtle consequences. It also suggests consistent extensions that maintain the integrity of the model. Restricted delegation enables flexible administrative boundaries. Conventional systems assume a hierarchy of administrative control, and thus cannot express non-hierarchical trust relationships. Restricted delegation, on the other hand, models real, social relationships. It can model hierarchy: a manager trusts each of his employees in certain ways. Or it can model arbitrary trust graphs. In the example above, the system administrator trusts Alice to manipulate database records about insects. Alice trusts Bob about field observations, so transitively, Bob may create field observation records about insects. Likewise, Bob may trust Charlie to read any of his data, so Charlie is allowed to read the database records on insect field observations. The red arrows represent Charlie making a request of the database server; for it to be granted, Charlies software will supply a proof of his permission that references each of the restricted delegations shown. Quoting principals defer access control decisions to the ultimate resource server. The host does not make per-file access control decisions, it only needs to take care to quote the right user. Hence quoting makes it easier to build such multiplexed resources securely, and helps reduce the size of the trusted computing base. Conjunct principals let us model redundancy. Here, modifying the DNS server requires the agreement of both the CIO and the sysadmin. The webmaster has obtained restricted permission to speak on behalf of both the CIO and the sysadmin, and is therefore trusted to make certain changes to the DNS server. Access Control Logic Lampson, Abadi, et al. s formal semantics for delegation B A SPKI authorization certificates (cryptography) Local and implicit delegations (trusted computing base) Formal semantics for restricted delegation B T A Access Control Implementation we borrow we contribute we contribute we borrow


Lecture Notes in Computer Science | 2000

A formal semantics for SPKI

Jon Howell; David Kotz


operating systems design and implementation | 2000

End-to-end authorization

Jon Howell; David Kotz


international workshop on persistent object systems | 1999

Straightforward Java Persistence Through Checkpointing

Jon Howell


Archive | 1999

An Access-Control Calculus for Spanning Administrative Domains

Jon Howell; David Kotz


Archive | 2000

Landmarks for absolute localization

Jon Howell; Keith Kotay

Collaboration


Dive into the Jon Howell's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Daniela Rus

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Lee R. Taylor

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Matthew T. Mason

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge