Sciweavers

7080 search results - page 1268 / 1416
» Designing High Integrity Systems Using Aspects
Sort
View
148
Voted
ISSRE
2008
IEEE
15 years 9 months ago
Detection and Prediction of Resource-Exhaustion Vulnerabilities
Systems connected to the Internet are highly susceptible to denial-of-service attacks that can compromise service availability, causing damage to customers and providers. Due to e...
João Antunes, Nuno Ferreira Neves, Paulo Ve...
116
Voted
HASE
2007
IEEE
15 years 9 months ago
On the Verifiability of Programs Written in the Feature Language Extensions
High assurance in embedded system software is difficult to attain. Verification relies on testing. The unreliable and costly testing process is made much worse because the softwar...
Wu-Hon F. Leung
IPCCC
2007
IEEE
15 years 9 months ago
First Responders' Crystal Ball: How to Scry the Emergency from a Remote Vehicle
Successes and failures during rescue operations after hurricane Katrina and the Twin Towers attack demonstrated the importance of supporting first responders with adequate means t...
Marco Roccetti, Mario Gerla, Claudio E. Palazzi, S...
IROS
2006
IEEE
205views Robotics» more  IROS 2006»
15 years 9 months ago
Vision-based Motion Planning for an Autonomous Motorcycle on Ill-Structured Road
— We report our development of a vision-based motion planning system for an autonomous motorcycle designed for desert terrain, where uniform road surface and lane markings are no...
Dezhen Song, Hyun Nam Lee, Jingang Yi, Anthony Lev...
TRIDENTCOM
2006
IEEE
15 years 9 months ago
Light-trail testbed for metro optical networks
— Telecommunication networks have rapidly added staggering amounts of capacity to their long haul networks at low costs per bit using DWDM technologies. Concurrently, there has b...
Nathan A. VanderHorn, Srivatsan Balasubramanian, M...
« Prev « First page 1268 / 1416 Last » Next »