Sciweavers

2255 search results - page 382 / 451
» High Assurance Software Systems
Sort
View
119
Voted
ENTCS
2008
140views more  ENTCS 2008»
15 years 25 days ago
Linking Event-B and Concurrent Object-Oriented Programs
The Event-B method is a formal approach to modelling systems, using refinement. Initial specification is a high level of abstraction; detail is added in refinement steps as the de...
Andrew Edmunds, Michael Butler
TIFS
2008
142views more  TIFS 2008»
15 years 20 days ago
An FPGA-Based Network Intrusion Detection Architecture
Abstract--Network intrusion detection systems (NIDSs) monitor network traffic for suspicious activity and alert the system or network administrator. With the onset of gigabit netwo...
Abhishek Das, David Nguyen, Joseph Zambreno, Gokha...
120
Voted
JMM2
2007
116views more  JMM2 2007»
15 years 19 days ago
Automatic Deformation Detection for Aircraft Engine Disk Inspection
— Computer vision algorithms are seeing increased use in industrial inspection applications. Here, we present an “Aid to Visual” system that can detect post deformations of l...
Dirk R. Padfield, Glen Brooksby, Robert Kaucic
100
Voted
SIMPAR
2010
150views Robotics» more  SIMPAR 2010»
14 years 11 months ago
Compliant Robot Actuation by Feedforward Controlled Emulated Spring Stiffness
Abstract. Existing legged robots lack energy-efficiency, performance and adaptivity when confronted with situations that animals cope with on a routine basis. Bridging the gap bet...
Katayon Radkhah, Stefan Kurowski, Thomas Lens, Osk...
CHI
2011
ACM
14 years 4 months ago
Characterizing the usability of interactive applications through query log analysis
People routinely rely on Internet search engines to support their use of interactive systems: they issue queries to learn how to accomplish tasks, troubleshoot problems, and other...
Adam Fourney, Richard Mann, Michael Terry