Sciweavers

3077 search results - page 277 / 616
» Design Principles for Application Integration
Sort
View
109
Voted
EUROPAR
2007
Springer
15 years 9 months ago
Analysis of a Kalman Approach for a Pedestrian Positioning System in Indoor Environments
In this work we present the design principles of a wearable positioning system for users in unprepared indoor environments. We describe the most suitable technology for our applica...
Edith Pulido Herrera, Ricardo Quirós, Hanne...
ACRI
2004
Springer
15 years 8 months ago
Evolving Transition Rules for Multi Dimensional Cellular Automata
Abstract. Genetic Algorithms have been used before to evolve transition rules for one dimensional Cellular Automata (CA) to solve e.g. the majority problem and investigate communic...
Ron Breukelaar, Thomas Bäck
NDSS
2003
IEEE
15 years 8 months ago
Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools
System call interposition is a powerful method for regulating and monitoring application behavior. In recent years, a wide variety of security tools have been developed that use t...
Tal Garfinkel
138
Voted
BPM
2003
Springer
102views Business» more  BPM 2003»
15 years 8 months ago
A Process-Oriented Model for Authentication on the Basis of a Coloured Petri Net
Abstract. Public-key cryptography is a prerequisite for security in distributed systems and for reliable electronic commerce. The protection of public keys against attacks is the A...
Peter Lory
117
Voted
FMCO
2003
Springer
123views Formal Methods» more  FMCO 2003»
15 years 8 months ago
Machine Function Based Control Code Algebras
Abstract. Machine functions have been introduced by Earley and Sturgis in [6] in order to provide a mathematical foundation of the use of the T-diagrams proposed by Bratman in [5]....
Jan A. Bergstra