Sciweavers

1336 search results - page 218 / 268
» An approach to stopping problems of a dynamic fuzzy system
Sort
View
ECBS
2010
IEEE
209views Hardware» more  ECBS 2010»
15 years 5 months ago
Continuous Verification of Large Embedded Software Using SMT-Based Bounded Model Checking
The complexity of software in embedded systems has increased significantly over the last years so that software verification now plays an important role in ensuring the overall pr...
Lucas Cordeiro, Bernd Fischer 0002, João Ma...
CDC
2010
IEEE
135views Control Systems» more  CDC 2010»
14 years 8 months ago
Synchronous rendezvous of very-low-range wireless agents
In this paper, we address the problem of temporal synchronization of a team of mobile agents on a set of rendezvous points defined by the nodes of a bipartite network. In particula...
Michael M. Zavlanos

Publication
107views
15 years 10 months ago
RATC: A Robust Automated Tag Clustering Technique
Abstract. Nowadays, the most dominant and noteworthy web information sources are developed according to the collaborative-web paradigm, also known as Web 2.0. In particular, it rep...
Ludovico Boratto, Salvatore Carta, Eloisa Vargiu
CCS
2007
ACM
15 years 7 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
RR
2007
Springer
15 years 7 months ago
Efficiently Querying Relational Databases Using OWL and SWRL
For the foreseeable future, most data will continue to be stored in relational databases. To work with these data in ontology-based applications, tools and techniques that bridge t...
Martin J. O'Connor, Ravi Shankar, Samson W. Tu, Cs...