Sciweavers

3516 search results - page 438 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
ICRA
2002
IEEE
168views Robotics» more  ICRA 2002»
15 years 9 months ago
A Dynamical Systems Approach to Behavior-Based Formation Control
Dynamical systems theory is used here as a theoretical language and tool to design a distributed control archictecture that generates navigation in formation, integrated with obst...
Sergio Monteiro, Estela Bicho
CN
1999
93views more  CN 1999»
15 years 4 months ago
Bro: a system for detecting network intruders in real-time
We describe Bro, a stand-alone system for detecting network intruders in real-time by passively monitoring a network link over which the intruder's traffic transits. We give ...
Vern Paxson
ICMCS
2008
IEEE
123views Multimedia» more  ICMCS 2008»
15 years 11 months ago
Scalable data hiding for online textured 3D terrain visualization
A method for 3D scalable visualization, in a client/server environment is presented. The main idea presented in this paper is to increase the quality of 3D visualization for low b...
Khizar Hayat, William Puech, Gilles Gesquiere
ICC
2007
IEEE
112views Communications» more  ICC 2007»
15 years 11 months ago
Design of a Stabilizing Second-Order Congestion Controller for Large-Delay Networks
—This paper addresses the problem of the stability of congestion control for networks with large round-trip communication delays. Nearly all the existed AQM schemes neglect the i...
Jianxin Wang, Liang Rong, Guojun Wang, Weijia Jia,...
DS
1997
104views Database» more  DS 1997»
15 years 6 months ago
Managing Constraint Violations in Administrative Information Systems
This paper motivates a comprehensive methodological framework for dealing with some aspects of real-world complexity in information system analysis and design. By complex applicat...
I. Boydens, Alain Pirotte, Esteban Zimányi