Sciweavers

4150 search results - page 222 / 830
» A Practical Approach to Model Extension
Sort
View
FSKD
2006
Springer
125views Fuzzy Logic» more  FSKD 2006»
15 years 8 months ago
Towards Security Evaluation Based on Evidence Collection
Information security evaluation of software-intensive systems typically relies heavily on the experience of the security professionals. Obviously, automated approaches are needed ...
Reijo Savola
ROBOCUP
1998
Springer
128views Robotics» more  ROBOCUP 1998»
15 years 7 months ago
A Multi-Level Constraint-Based Controller for the Dynamo98 Robot Soccer Team
Abstract. Constraint Nets provide a semantic model for modeling hybrid dynamic systems. Controllers are embedded constraint solvers that solve constraints in real-time. A controlle...
Yu Zhang, Alan K. Mackworth
TASE
2007
IEEE
15 years 10 months ago
Model Checking Networked Programs in the Presence of Transmission Failures
Software model checkers work directly on single-process programs, but not on multiple processes. Conversion of processes into threads, combined with a network model, allows for mo...
Cyrille Artho, Christian Sommer 0002, Shinichi Hon...
ATAL
2009
Springer
15 years 11 months ago
Distributed constraint optimization with structured resource constraints
Distributed constraint optimization (DCOP) provides a framework for coordinated decision making by a team of agents. Often, during the decision making, capacity constraints on age...
Akshat Kumar, Boi Faltings, Adrian Petcu
HICSS
2012
IEEE
324views Biometrics» more  HICSS 2012»
13 years 12 months ago
Extending BPMN for Business Activity Monitoring
—Real-time access to key performance indicators is necessary to ensure timeliness and effectiveness of operational business processes. The concept of Business Activity Monitoring...
Jan-Philipp Friedenstab, Christian Janiesch, Marti...