Sciweavers

1151 search results - page 41 / 231
» A Requirements Negotiation Model Based on Multi-Criteria Ana...
Sort
View
ASIASIM
2004
Springer
15 years 7 months ago
Simulating Cyber-intrusion Using Ordered UML Model-Based Scenarios
Abstract. Network security simulator is required for the study on the cyber intrusion and defense as cyber terrors have been increasingly popular. Until now, network security simul...
Eung Ki Park, Joo Beom Yun, Hoh Peter In
EUROCRYPT
1999
Springer
15 years 6 months ago
An Analysis of Exponentiation Based on Formal Languages
A recoding rule for exponentiation is a method for reducing the cost of the exponentiation ae by reducing the number of required multiplications. If w(e) is the (hamming) weight of...
Luke O'Connor
AAAI
1994
15 years 3 months ago
Exploiting Meta-Level information in a Distributed Scheduling System
In this paper, we study the problem of achieving efficient interaction in a distributed scheduling system whose scheduling agents may borrow resources from one another. Specifical...
Daniel E. Neiman, David W. Hildum, Victor R. Lesse...
RTSS
2007
IEEE
15 years 8 months ago
Composing Functional and State-Based Performance Models for Analyzing Heterogeneous Real-Time Systems
— We present a performance analysis technique for distributed real-time systems in a setting where certain components are modeled in a purely functional manner, while the remainin...
Linh T. X. Phan, Samarjit Chakraborty, P. S. Thiag...
ICRA
1994
IEEE
102views Robotics» more  ICRA 1994»
15 years 6 months ago
Sensor-Based Planning and Nonsmooth Analysis
This paper describes some initial steps towards sensor based path planning in an unknown static environment. The method is a based on a sensor-based incremental construction of a o...
Howie Choset, Joel W. Burdick