Sciweavers

2015 search results - page 167 / 403
» Hidden Software Capabilities
Sort
View
HICSS
2007
IEEE
87views Biometrics» more  HICSS 2007»
15 years 7 months ago
A Semantic Recognizer Infrastructure for Computing Loop Behavior
Next-generation software engineering is envisioned as a computational discipline that complements human capability through automated computation of software behavior and propertie...
Ali Mili, Tim Daly, Mark Pleszkoch, Stacy J. Prowe...
101
Voted
ICRA
2007
IEEE
178views Robotics» more  ICRA 2007»
15 years 7 months ago
Increased Mars Rover Autonomy using AI Planning, Scheduling and Execution
—This paper presents technology for performing autonomous commanding of a planetary rover. Through the use of AI planning, scheduling and execution techniques, the OASIS autonomo...
Tara A. Estlin, Daniel M. Gaines, Caroline Chouina...
98
Voted
SCAM
2007
IEEE
15 years 7 months ago
SUDS: An Infrastructure for Creating Bug Detection Tools
SUDS is a powerful infrastructure for creating dynamic bug detection tools. It contains phases for both static analysis and dynamic instrumentation allowing users to create tools ...
Eric Larson
113
Voted
ADAEUROPE
2007
Springer
15 years 7 months ago
Sancta: An Ada 2005 General-Purpose Architecture for Mobile Robotics Research
Abstract. We present Sancta, a flexible control architecture for multirobot teams. It is fully written in Ada 2005, except for the reuse of some C libraries. In this paper we high...
Alejandro R. Mosteo, Luis Montano
105
Voted
CCS
2007
ACM
15 years 7 months ago
Towards a taxonomy for information security metrics
Systematic approaches to measuring security are needed in order to obtain evidence of the security performance of products or an organization. In this study we survey the emerging...
Reijo Savola