Sciweavers

2192 search results - page 180 / 439
» Embedded function composition
Sort
View
108
Voted
SEUS
2010
IEEE
14 years 11 months ago
Ubiquitous Verification of Ubiquitous Systems
Abstract. Ubiquitous embedded computing systems expected to reliably perform one or more relevant tasks need design and verification methods currently not available. New envisioned...
Reinhard Wilhelm, Matteo Maffei
90
Voted
AUTOMATICA
2008
96views more  AUTOMATICA 2008»
15 years 1 months ago
Nonlinear gliding stability and control for vehicles with hydrodynamic forcing
This paper presents Lyapunov functions for proving stability of steady gliding motions for vehicles with hydrodynamic or aerodynamic forces and moments. Because of lifting forces ...
Pradeep Bhatta, Naomi Ehrich Leonard
104
Voted
ICIP
2005
IEEE
16 years 2 months ago
Statistical restoration for robust and secure steganography
We investigate data hiding techniques that attempt to defeat steganalysis by restoring the statistics of the composite image to resemble that of the cover. The approach is to rese...
Kaushal Solanki, Kenneth Sullivan, Upamanyu Madhow...
117
Voted
ESOP
2010
Springer
15 years 10 months ago
Precise and Automated Contract-based Reasoning for Verification and Certification of Information Flow Properties of Programs wit
Abstract. Embedded information assurance applications that are critical to national and international infrastructures, must often adhere to certification regimes that require infor...
Torben Amtoft, John Hatcliff and Edwin Rodríguez
128
Voted
WORDS
2005
IEEE
15 years 6 months ago
A Framework for Middleware Supporting Real-Time Wide-Area Distributed Computing
: The development of real-time systems that are distributed over a wide area is a significant problem that has challenged researchers for many years. Such systems require precise t...
K. H. (Kane) Kim, Stephen F. Jenks, Larry Smarr, A...