Sciweavers

21 search results - page 4 / 5
» Incremental Component-Based Construction and Verification of...
Sort
View
SAINT
2003
IEEE
13 years 11 months ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta
ICVS
2003
Springer
13 years 11 months ago
The Imalab Method for Vision Systems
We propose a method to construct computer vision systems using a workbench composed of a multi-faceted toolbox and a general purpose kernel. The toolbox is composed of an open set ...
Augustin Lux
LPAR
2010
Springer
13 years 4 months ago
Synthesis of Trigger Properties
In automated synthesis, we transform a specification into a system that is guaranteed to satisfy the specification. In spite of the rich theory developed for temporal synthesis, l...
Orna Kupferman, Moshe Y. Vardi
IROS
2009
IEEE
168views Robotics» more  IROS 2009»
14 years 26 days ago
A stream-based hierarchical anchoring framework
— Autonomous systems situated in the real world often need to recognize, track, and reason about various types of physical objects. In order to allow reasoning at a symbolic leve...
Fredrik Heintz, Jonas Kvarnström, Patrick Doh...
SIGSOFT
2008
ACM
14 years 7 months ago
Requirements engineering: from craft to discipline
Getting the right software requirements under the right environment assumptions is a critical precondition for developing the right software. This task is intrinsically difficult....
Axel van Lamsweerde