Sciweavers

2223 search results - page 176 / 445
» Events in Property Patterns
Sort
View
SASN
2003
ACM
15 years 8 months ago
Modeling vulnerabilities of ad hoc routing protocols
The purpose of this work is to automate the analysis of ad hoc routing protocols in the presence of attackers. To this end, a formal model of protocol behavior is developed in whi...
Shahan Yang, John S. Baras
AVSS
2006
IEEE
15 years 9 months ago
Multimedia Surveillance and Monitoring
Most surveillance and monitoring systems nowadays utilize multiple types of sensors. However, due to the asynchrony among and diversity of sensors, information assimilation how to...
Mohan S. Kankanhalli
119
Voted
WSC
2001
15 years 4 months ago
Dimensionality analysis of a simulation outcome space
This paper investigates the dimensionality characteristics of the outcome space of a combat simulation. The independent state variables of all of the outcome states for a simulati...
John B. Gilmer Jr., Frederick J. Sullivan
108
Voted
FDL
2005
IEEE
15 years 9 months ago
PSL-based online monitoring of digital systems
We present an original method for generating monitors that capture the occurrence of events, specified by logical and temporal properties under the form of assertions in declarati...
D. Borionne, M. Liu, P. Ostier, Laurent Fesquet
132
Voted
ISIPTA
2005
IEEE
130views Mathematics» more  ISIPTA 2005»
15 years 9 months ago
Computing Lower and Upper Expectations under Epistemic Independence
This papers investigates the computation of lower/upper expectations that must cohere with a collection of probabilistic assessments and a collection of judgements of epistemic in...
Cassio Polpo de Campos, Fabio Gagliardi Cozman