Sciweavers

1414 search results - page 127 / 283
» Combining Intruder Theories
Sort
View
104
Voted
FOSSACS
2009
Springer
15 years 7 months ago
Realizability of Concurrent Recursive Programs
Abstract. We define and study an automata model of concurrent recursive programs. An automaton consists of a finite number of pushdown systems running in parallel and communicati...
Benedikt Bollig, Manuela-Lidia Grindei, Peter Habe...
92
Voted
IROS
2009
IEEE
185views Robotics» more  IROS 2009»
15 years 7 months ago
Constraint task-based control in industrial settings
Abstract— Direct physical human-robot interaction has become a central part in the research field of robotics today. To use the advantages of the potential for humans and robots...
Claus Lenz, Markus Rickert, Giorgio Panin, Alois K...
ISPW
2009
IEEE
15 years 7 months ago
Software Product Quality: Ensuring a Common Goal
: Software qualities are in many cases tacit and hard to measure. Thus, there is a potential risk that they get lower priority than deadlines, cost and functionality. This paper pr...
Sebastian Barney, Claes Wohlin
91
Voted
BRAIN
2009
Springer
15 years 7 months ago
Modelling the Reciprocal Interaction between Believing and Feeling from a Neurological Perspective
Abstract. By adopting neurological theories on the role of emotions and feelings, an agent model is introduced incorporating the reciprocal interaction between believing and feelin...
Zulfiqar A. Memon, Jan Treur
108
Voted
ISSAC
2009
Springer
150views Mathematics» more  ISSAC 2009»
15 years 7 months ago
On finding multiplicities of characteristic polynomial factors of black-box matrices
We present algorithms and heuristics to compute the characteristic polynomial of a matrix given its minimal polynomial. The matrix is represented as a black-box, i.e., by a functi...
Jean-Guillaume Dumas, Clément Pernet, B. Da...