Sciweavers

8655 search results - page 1177 / 1731
» Challenges for Trusted Computing
Sort
View
171
Voted
IJES
2006
134views more  IJES 2006»
15 years 5 months ago
Applying model-driven development to distributed real-time and embedded avionics systems
Model-driven development (MDD) is an emerging paradigm that uses domain-specific modeling languages (DSMLs) and generative technologies to provide "correct-by-construction&quo...
Krishnakumar Balasubramanian, Arvind S. Krishna, E...
137
Voted
IJON
2006
76views more  IJON 2006»
15 years 5 months ago
Evolving networks of integrate-and-fire neurons
This paper addresses the following question: ``What neural circuits can emulate the monosynaptic correlogram generated by a direct connection between two neurons?'' The ...
Francisco J. Veredas, Francisco J. Vico, Jos&eacut...
JCP
2008
116views more  JCP 2008»
15 years 5 months ago
Formal Verification and Visualization of Security Policies
Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...
157
Voted
CORR
2007
Springer
93views Education» more  CORR 2007»
15 years 5 months ago
A Framework for Providing E-Services to the Rural Areas using Wireless Ad Hoc and Sensor Networks
In recent years, the proliferation of mobile computing devices has driven a revolutionary change in the computing world. The nature of ubiquitous devices makes wireless networks th...
Al-Sakib Khan Pathan, Humayun Kadir Islam, Sabit A...
JAIR
2006
101views more  JAIR 2006»
15 years 5 months ago
Resource Allocation Among Agents with MDP-Induced Preferences
Allocating scarce resources among agents to maximize global utility is, in general, computationally challenging. We focus on problems where resources enable agents to execute acti...
Dmitri A. Dolgov, Edmund H. Durfee
« Prev « First page 1177 / 1731 Last » Next »