Sciweavers

955 search results - page 155 / 191
» Model Checking Operator Procedures
Sort
View
FMOODS
2007
15 years 2 months ago
A Probabilistic Formal Analysis Approach to Cross Layer Optimization in Distributed Embedded Systems
We present a novel approach, based on probabilistic formal methods, to developing cross-layer resource optimization policies for resource limited distributed systems. One objective...
Minyoung Kim, Mark-Oliver Stehr, Carolyn L. Talcot...
111
Voted
WORM
2003
15 years 2 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
116
Voted
FUIN
2008
147views more  FUIN 2008»
15 years 24 days ago
A Basic Logic for Reasoning about Connector Reconfiguration
Abstract. Software systems evolve over time. From a component-based software engineering perspective, this means that either the components of the system need to change, or, if com...
Dave Clarke
JFR
2008
148views more  JFR 2008»
15 years 22 days ago
Terrain-based vehicle orientation estimation combining vision and inertial measurements
A novel method for estimating vehicle roll, pitch and yaw using machine vision and inertial sensors is presented that is based on matching images captured from an on-vehicle camer...
Vishisht Gupta, Sean Brennan
SIMULATION
1998
177views more  SIMULATION 1998»
15 years 12 days ago
Simulation and Planning of an Intermodal Container Terminal
A decision support system for the management of an intermodal container terminal is presented. Among the problems to be solved, there are the spatial allocation of containers on t...
Luca Maria Gambardella, Andrea Emilio Rizzoli, Mar...