Sciweavers

3516 search results - page 600 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
119
Voted
ACMSE
2004
ACM
15 years 9 months ago
Distributed robotic target acquisition using Bluetooth communication
This paper presents a distributed multi-robot system designed to solve a team-based search and destroy task. The project was divided into two phases. The initial phase was used to...
J. T. McClain, Bradley J. Wimpey, D. H. Barnhard, ...
124
Voted
HPDC
1998
IEEE
15 years 8 months ago
Authorization for Metacomputing Applications
One of the most difficult problems to be solved by metacomputing systems is to ensure strong authentication and authorization. The problem is complicated since the hosts involved ...
G. Gheorghiu, Tatyana Ryutov, B. Clifford Neuman
GIS
2002
ACM
15 years 3 months ago
Generic query tool for spatio-temporal data
Geographical information systems are more and more based on a DBMS with spatial extensions, which is also the case for the system described in this paper. The design and implementa...
Peter van Oosterom, Bart Maessen, Wilko Quak
139
Voted
CAISE
2008
Springer
15 years 5 months ago
Extended Kaos to Support Variability for Goal Oriented Requirements Reuse
This work is done as part of the Tacos project1 whose aims is to define a component-based approach to specify trustworthy systems from the requirements phase to the specification p...
Farida Semmak, Christophe Gnaho, Régine Lal...
157
Voted
JVCA
2002
180views more  JVCA 2002»
15 years 3 months ago
A programming environment for behavioural animation
Behavioural models offer the ability to simulate autonomous agents like organisms and living beings. Psychological studies have showed that the human behaviour can be described by...
Frédéric Devillers, Stéphane ...