Sciweavers

3022 search results - page 42 / 605
» From plans to planning: the case of nursing plans
Sort
View
SIGOPS
2008
183views more  SIGOPS 2008»
14 years 10 months ago
Plan 9 authentication in Linux
In Linux, applications like su and login currently run as root in order to access authentication information and set or alter the identity of the process. In such cases, if the ap...
Ashwin Ganti
INFORMATICALT
2007
76views more  INFORMATICALT 2007»
14 years 10 months ago
An Integrative Framework to Protocol Analysis and Repair: Bellare-Rogaway Model + Planning + Model Checker
A modified version of the Bellare and Rogaway (1993) adversarial model is encoded using Asynchronous Product Automata (APA). A model checker tool, Simple Homomorphism Verificatio...
Kim-Kwang Raymond Choo
GECCO
2008
Springer
114views Optimization» more  GECCO 2008»
14 years 11 months ago
Strategic positioning in tactical scenario planning
Capability planning problems are pervasive throughout many areas of human interest with prominent examples found in defense and security. Planning provides a unique context for op...
James M. Whitacre, Hussein A. Abbass, Ruhul A. Sar...
IROS
2007
IEEE
188views Robotics» more  IROS 2007»
15 years 4 months ago
Behavior maps for online planning of obstacle negotiation and climbing on rough terrain
Abstract— To autonomously navigate on rough terrain is a challenging problem for mobile robots, requiring the ability to decide whether parts of the environment can be traversed ...
Christian Dornhege, Alexander Kleiner
DATE
2009
IEEE
154views Hardware» more  DATE 2009»
15 years 5 months ago
Reliability aware through silicon via planning for 3D stacked ICs
Abstract—This work proposes reliability aware through silicon via (TSV) planning for the 3D stacked silicon integrated circuits (ICs). The 3D power distribution network is modele...
Amirali Shayan Arani, Xiang Hu, He Peng, Chung-Kua...