Sciweavers

597 search results - page 75 / 120
» E-Process Design and Assurance Using Model Checking
Sort
View
144
Voted
SIGSOFT
2007
ACM
16 years 3 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
107
Voted
ADAEUROPE
2005
Springer
15 years 8 months ago
Extending Ravenscar with CSP Channels
Abstract. The Ravenscar Profile is a restricted subset of the Ada tasking model, designed to meet the requirements of producing analysable and deterministic code. A central featur...
Diyaa-Addein Atiya, Steve King
123
Voted
CVPR
2009
IEEE
16 years 9 months ago
Active Stereo Tracking of Multiple Free-Moving Targets
This article presents a general approach for the active stereo tracking of multiple moving targets. The problem is formulated on the plane, where cameras are modeled as ”line ...
Helder Araújo, João P. Barreto, Luis...
137
Voted
AUTONOMICS
2009
ACM
15 years 9 months ago
Sensor Selection for IT Infrastructure Monitoring
Supervisory control is the main means to assure a high level performance and availability of large IT infrastructures. Applied control theory is used in physical and virtualization...
Gergely János Paljak, Imre Kocsis, Zolt&aac...
109
Voted
SOFTVIS
2003
ACM
15 years 8 months ago
Nice Class Diagrams Admit Good Design?
Analysis and design of programs by using tools has emerged to a standard technique in object-oriented software engineering. Many of these tools claim to implement methods accordin...
Holger Eichelberger