Sciweavers

2131 search results - page 173 / 427
» Multi-Agent System Development: Design, Runtime, and Analysi...
Sort
View
WSC
2004
15 years 6 months ago
Applying Statistical Control Techniques to Air Traffic Simulations
While the literature contains several adaptive sampling techniques for statistical comparison of competing simulated system configurations and for embedded statistical computation...
Kirk C. Benson, David Goldsman, Amy R. Pritchett
ECOOP
2005
Springer
15 years 11 months ago
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection
In Java 2 and Microsoft .NET Common Language Runtime (CLR), trusted code has often been programmed to perform accessrestricted operations not explicitly requested by its untrusted ...
Marco Pistoia, Robert J. Flynn, Larry Koved, Vugra...
161
Voted
IROS
2006
IEEE
117views Robotics» more  IROS 2006»
15 years 11 months ago
Design and Manufacturing of a Mobile Rescue Robot
This paper presents design and manufacturing procedure of a tele-operative rescue robot. First, the general task to be performed by such a robot is defined, and variant kinematic m...
S. Ali A. Moosavian, Hesam Semsarilar, Arash Kalan...
VALUETOOLS
2006
ACM
236views Hardware» more  VALUETOOLS 2006»
15 years 11 months ago
The DISCO network calculator: a toolbox for worst case analysis
In this paper we describe the design, implementation, and analytical background of the DISCO Network Calculator. The DISCO Network Calculator is an open-source toolbox written in ...
Jens B. Schmitt, Frank A. Zdarsky
FOSSACS
2004
Springer
15 years 11 months ago
Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols
Abstract. Using a probabilistic polynomial-time process calculus designed for specifying security properties as observational equivalences, we develop a form of bisimulation that j...
Ajith Ramanathan, John C. Mitchell, Andre Scedrov,...