Sciweavers

2874 search results - page 495 / 575
» Intrusion Detection: Systems and Models
Sort
View
IJRR
2008
114views more  IJRR 2008»
14 years 12 months ago
Active Electrolocation for Underwater Target Localization
We explore the capabilities of a robotic sensing system designed to locate objects underwater through active movement of an electric field emitter and sensor apparatus. The system ...
James R. Solberg, Kevin M. Lynch, Malcolm A. MacIv...
AROBOTS
2002
105views more  AROBOTS 2002»
14 years 11 months ago
A Social Robot that Stands in Line
Recent research in mobile robot navigation make it feasible to utilize autonomous robots in service fields. But, such applications require more than just navigation. To operate in...
Yasushi Nakauchi, Reid G. Simmons
WCRE
2010
IEEE
14 years 10 months ago
Understanding Feature Evolution in a Family of Product Variants
Existing software product variants, developed by ad hoc reuse such as copy-paste-modify, are often a starting point for building Software Product Line (SPL). Understanding of how ...
Yinxing Xue, Zhenchang Xing, Stan Jarzabek
TAP
2010
Springer
134views Hardware» more  TAP 2010»
14 years 9 months ago
Testing First-Order Logic Axioms in Program Verification
Program verification systems based on automated theorem provers rely on user-provided axioms in order to verify domain-specific properties of code. However, formulating axioms corr...
Ki Yung Ahn, Ewen Denney
IEEEARES
2009
IEEE
14 years 9 months ago
Software Inspections Using Guided Checklists to Ensure Security Goals
Security is a crucial issue in many modern software systems and can lead to immense costs if required security goals are not fulfilled. Fewer techniques exist to address the syste...
Frank Elberzhager, Alexander Klaus, Marek Jawurek