Sciweavers

TSMC
2008
110views more  TSMC 2008»
13 years 4 months ago
Adaptive Lyapunov-Based Control of a Robot and Mass-Spring System Undergoing an Impact Collision
The control of dynamic systems that undergo an impact collision is both theoretically challenging and of practical importance. An appeal of studying systems that undergo an impact ...
Keith Dupree, Chien-Hao Liang, Guoqiang Hu, Warren...
JKM
2007
213views more  JKM 2007»
13 years 4 months ago
A systems-based dynamic knowledge transfer capacity model
Purpose – The purpose of this paper is twofold: to understand how recent developments in systems thinking and social construction can influence understanding of knowledge trans...
Robert Parent, Mario Roy, Denis St-Jacques
JIRS
2007
120views more  JIRS 2007»
13 years 4 months ago
Optimal Camera Placement for Automated Surveillance Tasks
— Today, there are many opportunities to create vision-based intelligent systems that are human-centric. This is a very rich area because humans are very complex, and the number ...
Robert Bodor, Andrew Drenner, Paul R. Schrater, Ni...
JCT
2007
85views more  JCT 2007»
13 years 4 months ago
Separating systems and oriented graphs of diameter two
We prove results on the size of weakly and strongly separating set systems and matrices, and on cross-intersecting systems. As a consequence, we improve on a result of Katona and ...
Béla Bollobás, Alex D. Scott
TOCS
2008
131views more  TOCS 2008»
13 years 4 months ago
A generic component model for building systems software
Component-based software structuring principles are now commonly and successfully applied at the application level; but componentisation is far less established when it comes to b...
Geoff Coulson, Gordon S. Blair, Paul Grace, Fran&c...
JCP
2007
127views more  JCP 2007»
13 years 4 months ago
Defending Cyberspace with Fake Honeypots
—Honeypots are computer systems designed for no purpose other than recording attacks on them. Cyberattackers should avoid them since honeypots jeopardize the secrecy of attack me...
Neil C. Rowe, E. John Custy, Binh T. Duong
TDSC
2008
119views more  TDSC 2008»
13 years 4 months ago
Architectural Risk Analysis of Software Systems Based on Security Patterns
The importance of software security has been profound, since most attacks to software systems are based on vulnerabilities caused by poorly designed and developed software. Further...
Spyros T. Halkidis, Nikolaos Tsantalis, Alexander ...
IJWIS
2007
153views more  IJWIS 2007»
13 years 4 months ago
A security framework for agent-based systems
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
Jamal Bentahar, Francesca Toni, John-Jules Ch. Mey...
TASE
2008
IEEE
13 years 4 months ago
Event-B Specification of a Situated Multi-Agent System: Study of a Platoon of Vehicles
Situated Multi-Agents Systems (MAS), and other Agentbased systems, are often complex. Formal reasoning is needed to ensuring their correctness and structuring their development. E...
Arnaud Lanoix
ALIFE
2005
13 years 4 months ago
Modular Interdependency in Complex Dynamical Systems
Hierarchical modularity is a familiar characteristic of a large class of natural dynamical systems. A normal interpretation of modularity is that interactions between subsystems a...
Richard A. Watson, Jordan B. Pollack