Sciweavers

ETRICS
2006
15 years 6 months ago
A Comparison of Market Approaches to Software Vulnerability Disclosure
Abstract. Practical computer (in)security is largely driven by the existence of and knowledge about vulnerabilities, which can be exploited to breach security mechanisms. Although ...
Rainer Böhme
ETRICS
2006
15 years 6 months ago
Allowing State Changes in Specifications
Abstract. We provide a static analysis (using both dataflow analysis and theorem proving) to allow state changes within specifications. This can be used for specification languages...
Michael Barnett, David A. Naumann, Wolfram Schulte...
ETFA
2006
IEEE
15 years 6 months ago
Variable Pallet Pick-Up for Automatic Guided Vehicles in Industrial Environments
- This paper presents two laser scanner based approaches to locate and pick-up pallets with the aim of automating forklift trucks. In contrast to camera based systems our approache...
Daniel Lecking, Oliver Wulf, Bernardo Wagner
ETFA
2006
IEEE
15 years 6 months ago
Innovation Science
The term innovation resonates broadly in the cyberspace, books, and journals. A careful analysis of the literature indicates that the knowledge of the underlying science of innova...
Andrew Kusiak
ETFA
2006
IEEE
15 years 6 months ago
Component based deployment of industrial control systems: a hybrid scheduling approach
This paper deals with the IEC 61499 standard. A function block (FB) is an event triggered component and an application is a distributed FBs network on several devices. We consider...
Mohamed Khalgui, Xavier Rebeuf, Françoise S...