Sciweavers

1791 search results - page 151 / 359
» Behavioral Operations
Sort
View
AAAI
2006
15 years 5 months ago
A Causal Analysis Method for Concurrent Hybrid Automata
Modern artifacts are typically composed of many system components and exhibit a complex pattern of continuous/discrete behaviors. A concurrent hybrid automaton is a powerful model...
Michael W. Hofbaur, Franz Wotawa
CSREASAM
2006
15 years 5 months ago
Increasing Security in Mobile Ad Hoc Networks by Incentives to Cooperate and Secure Routing
A mobile ad hoc network is a self-organizing network that relies on the cooperation of participating nodes in order to function properly. In this network, mobile users arrive withi...
Ebrahim Khosravi, Brandy Tyson
DAGSTUHL
2003
15 years 5 months ago
Pattern Synthesis from Multiple Scenarios for Parameterized Real-Time UML Models
Abstract. The continuing trend towards more sophisticated technical applications results in an increasing demand for high quality software for complex, safety-critical systems. Des...
Holger Giese, Florian Klein, Sven Burmester
WSC
2004
15 years 5 months ago
Applying a Cognitive Architecture to Control of Virtual Non-Player Characters
CHI Systems, under contract to the U. S. Army Research Institute, is developing an immersive training system, called Virtual Environment Cultural Training for Operational Readines...
Chris McCollum, Charles Barba, Thomas Santarelli, ...
ISI
2008
Springer
15 years 4 months ago
Intrusion activity projection for cyber situational awareness
Previous works in the area of network security have emphasized the creation of Intrusion Detection Systems (IDSs) to flag malicious network traffic and computer usage. Raw IDS data...
S. J. Yang, S. Byers, J. Holsopple, B. Argauer, D....