Sciweavers

527 search results - page 83 / 106
» Case Study: System Model of Crane and Embedded Control
Sort
View
86
Voted
DEON
2008
Springer
14 years 11 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
IEE
2011
14 years 4 months ago
Using autonomous components to improve runtime qualities of software
: In the development of software systems, quality properties should be considered along with the development process so that the qualities of software systems can be inferred and p...
Wenpin Jiao
97
Voted
PADS
1999
ACM
15 years 1 months ago
Shock Resistant Time Warp
In an attempt to cope with time-varying workload, traditional adaptive Time Warp protocols are designed to react in response to performance changes by altering control parameter c...
Alois Ferscha, James Johnson
SEFM
2005
IEEE
15 years 3 months ago
Formal Analysis of Human-computer Interaction using Model-checking
Experiments with simulators allow psychologists to better understand the causes of human errors and build models of cognitive processes to be used in Human Reliability Assessment ...
Antonio Cerone, Peter A. Lindsay, Simon Connelly
113
Voted
SDM
2012
SIAM
340views Data Mining» more  SDM 2012»
13 years 1 days ago
IntruMine: Mining Intruders in Untrustworthy Data of Cyber-physical Systems
A Cyber-Physical System (CPS) integrates physical (i.e., sensor) devices with cyber (i.e., informational) components to form a situation-aware system that responds intelligently t...
Lu An Tang, Quanquan Gu, Xiao Yu, Jiawei Han, Thom...