Sciweavers

3082 search results - page 580 / 617
» Deviation Analysis: A New Use of Model Checking
Sort
View
SAFECOMP
2007
Springer
15 years 6 months ago
Controller Architecture for Safe Cognitive Technical Systems
Abstract. Cognition of technical systems, as the ability to perceive situations, to learn about favorable behavior, and to autonomously generate decisions, adds new attributes to s...
Sebastian Kain, Hao Ding, Frank Schiller, Olaf Stu...
COMPGEOM
2004
ACM
15 years 5 months ago
An empirical comparison of techniques for updating Delaunay triangulations
The computation of Delaunay triangulations from static point sets has been extensively studied in computational geometry. When the points move with known trajectories, kinetic dat...
Leonidas J. Guibas, Daniel Russel
ANSS
2003
IEEE
15 years 5 months ago
A Simulation Study of the Proactive Server Roaming for Mitigating Denial of Service Attacks
The main goal of the NETSEC project is to design and implement a framework for mitigating the effects of the node-based and link-based DoS attacks. Our strategy employs three lin...
Chatree Sangpachatanaruk, Sherif M. Khattab, Taieb...
EMSOFT
2006
Springer
15 years 3 months ago
Real-time interfaces for composing real-time systems
Recently, a number of frameworks were proposed to extend interface theory to the domains of single-processor and distributed real-time systems. This paper unifies some of these ap...
Lothar Thiele, Ernesto Wandeler, Nikolay Stoimenov
USS
2008
15 years 2 months ago
Practical Symmetric Key Cryptography on Modern Graphics Hardware
Graphics processors are continuing their trend of vastly outperforming CPUs while becoming more general purpose. The latest generation of graphics processors have introduced the a...
Owen Harrison, John Waldron