Sciweavers

708 search results - page 109 / 142
» Computational Law
Sort
View
SACMAT
2010
ACM
15 years 4 months ago
Monitoring security policies with metric first-order temporal logic
We show the practical feasibility of monitoring complex security properties using a runtime monitoring approach for metric first-order temporal logic. In particular, we show how ...
David A. Basin, Felix Klaedtke, Samuel Müller
MVA
2006
430views Computer Vision» more  MVA 2006»
14 years 11 months ago
Automatic fog detection and estimation of visibility distance through use of an onboard camera
In this paper, we will present a technique for measuring visibility distances under foggy weather conditions using a camera mounted onboard a moving vehicle. Our research has focus...
Nicolas Hautière, Jean-Philippe Tarel, Jean...
GCC
2004
Springer
15 years 5 months ago
Engineering Process Coordination Based on a Service Event Notification Model
Abstract. Due to the complexity and uncertainties, the engineering process requires dynamic collaborations among the heterogeneous systems and human interactions. In this paper, we...
Jian Cao, Jie Wang, Shen-sheng Zhang, Minglu Li, K...
DGO
2007
134views Education» more  DGO 2007»
15 years 1 months ago
Control patterns in a healthcare network
To keep a network of enterprises sustainable, inter-organizational control measures are needed to detect or prevent opportunistic behaviour of network participants. We present a m...
Vera Kartseva, Joris Hulstijn, Jaap Gordijn, Yao-H...
MWCN
2004
Springer
15 years 5 months ago
Understanding the Interactions between Unicast and Group Communications Sessions in Ad Hoc Networks
Abstract In this paper, our objective is to study and understand the mutual effects between the group communication protocols and unicast sessions in mobile ad hoc networks. The mo...
Lap Kong Law, Srikanth V. Krishnamurthy, Michalis ...