Sciweavers

1264 search results - page 92 / 253
» Designing Safe, Reliable Systems using Scade
Sort
View
CIDR
2007
79views Algorithms» more  CIDR 2007»
15 years 6 months ago
Beyond Just Data Privacy
We argue that designing a system that “guarantees” the privacy of its information may not be enough. One must also consider the price for providing that protection: For exampl...
Bob Mungamuru, Hector Garcia-Molina
AUSFORENSICS
2003
15 years 6 months ago
Honeyd - A OS Fingerprinting Artifice
This research looks at the efficiency of the honeyd honeypot system to reliably deceive intruders. Honeypots are being used as frontline network intelligence and forensic analysis...
Craig Valli
ISSTA
2009
ACM
15 years 11 months ago
Specifying the worst case: orthogonal modeling of hardware errors
During testing, the execution of valid cases is only one part of the task. Checking the behavior in boundary situations and in the presence of errors is an equally important subje...
Jewgenij Botaschanjan, Benjamin Hummel
ICRA
2009
IEEE
165views Robotics» more  ICRA 2009»
15 years 11 months ago
Collision avoidance in dynamic environments: An ICS-based solution and its comparative evaluation
Abstract— This paper presents ICS-AVOID, a collision avoidance scheme based upon the concept of Inevitable Collision State (ICS), ie a state for which, no matter what the future ...
Luis Martinez-Gomez, Thierry Fraichard
127
Voted
ATMOS
2007
124views Optimization» more  ATMOS 2007»
15 years 6 months ago
A Simulation/Optimization Framework for Locomotive Planning
Abstract. In this paper, we give an overview of the Locomotive Simulater/Optimizer (LSO) decision support system developed by us for railroads. This software is designed to imitate...
Artyom G. Nahapetyan, Ravindra K. Ahuja, F. Zeynep...