Sciweavers

2357 search results - page 81 / 472
» Computing Refactorings of Behavior Models
Sort
View
JNW
2006
55views more  JNW 2006»
14 years 10 months ago
On Stochastic Modeling for Integrated Security and Dependability Evaluation
This paper presents a new approach to integrated security and dependability evaluation, which is based on stochastic modeling techniques. Our proposal aims to provide operational m...
Karin Sallhammar, Bjarne E. Helvik, Svein J. Knaps...
ICMI
2003
Springer
99views Biometrics» more  ICMI 2003»
15 years 3 months ago
Selective perception policies for guiding sensing and computation in multimodal systems: a comparative analysis
Intensive computations required for sensing and processing perceptual information can impose significant burdens on personal computer systems. We explore several policies for sel...
Nuria Oliver, Eric Horvitz
ECAL
2007
Springer
15 years 4 months ago
A Computational System for Investigating Chemotaxis-Based Cell Aggregation
Abstract. We have developed a software system that simulates chemotaxis-based cell aggregation in 2D. The model implemented within the system consists of such cell behaviors as che...
Manolya Eyiyurekli, Peter I. Lelkes, David E. Bree...
SIGSOFT
2007
ACM
15 years 11 months ago
Measuring empirical computational complexity
The standard language for describing the asymptotic behavior of algorithms is theoretical computational complexity. We propose a method for describing the asymptotic behavior of p...
Simon Goldsmith, Alex Aiken, Daniel Shawcross Wilk...
TRUST
2009
Springer
15 years 4 months ago
Remote Attestation of Attribute Updates and Information Flows in a UCON System
UCON is a highly flexible and expressive usage control model which allows an object owner to specify detailed usage control policies to be evaluated on a remote platform. Assuranc...
Mohammad Nauman, Masoom Alam, Xinwen Zhang, Tamlee...