Sciweavers

666 search results - page 51 / 134
» Component-Based Design and Analysis: A Case Study
Sort
View
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
15 years 6 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
IROS
2007
IEEE
148views Robotics» more  IROS 2007»
15 years 6 months ago
Kinematic analysis and control of an omnidirectional mobile robot in rough terrain
—An omnidirectional mobile robot is able, kinematically, to move in any direction regardless of current pose. To date, nearly all designs and analyses of omnidirectional robots h...
Martin Udengaard, Karl Iagnemma
VRST
2006
ACM
15 years 5 months ago
A reprocessing tool for quantitative data analysis in a virtual environment
This paper presents an approach to help speed up and unify the exploration and analysis of time-dependent, volumetric data sets by easily incorporating new qualitative and quantit...
Eric J. Griffith, Michal Koutek, Frits H. Post, T....
OOPSLA
2004
Springer
15 years 5 months ago
Bottleneck analysis in java applications using hardware performance monitors
This poster presents MonitorMethod which helps Java programmers gain insight in the behavior of their applications. MonitorMethod instruments the Java application and relates hard...
Dries Buytaert, Andy Georges, Lieven Eeckhout, Koe...
DAC
2002
ACM
16 years 25 days ago
Hole analysis for functional coverage data
One of the main goals of coverage tools is to provide the user with informative presentation of coverage information. Specifically, information on large, cohesive sets of uncovere...
Oded Lachish, Eitan Marcus, Shmuel Ur, Avi Ziv