Sciweavers

4511 search results - page 623 / 903
» Observation Based System Security
Sort
View
ESE
2008
112views Database» more  ESE 2008»
15 years 4 months ago
"Cloning considered harmful" considered harmful: patterns of cloning in software
Literature on the topic of code cloning often asserts that duplicating code within a software system is a bad practice, that it causes harm to the system's design and should b...
Cory Kapser, Michael W. Godfrey
NN
2002
Springer
123views Neural Networks» more  NN 2002»
15 years 3 months ago
Neuromodulation and plasticity in an autonomous robot
In this paper we implement a computational model of a neuromodulatory system in an autonomous robot. The output of the neuromodulatory system acts as a value signal, modulating wi...
Olaf Sporns, William H. Alexander
CORR
2010
Springer
185views Education» more  CORR 2010»
15 years 28 days ago
Analysing the behaviour of robot teams through relational sequential pattern mining
This report outlines the use of a relational representation in a Multi-Agent domain to model the behaviour of the whole system. A desired property in this systems is the ability of...
Grazia Bombini, Raquel Ros, Stefano Ferilli, Ramon...
ICDE
2011
IEEE
281views Database» more  ICDE 2011»
14 years 8 months ago
Declarative analysis of noisy information networks
—There is a growing interest in methods for analyzing data describing networks of all types, including information, biological, physical, and social networks. Typically the data ...
Walaa Eldin Moustafa, Galileo Namata, Amol Deshpan...
CASES
2007
ACM
15 years 8 months ago
Rethinking custom ISE identification: a new processor-agnostic method
The last decade has witnessed the emergence of the Application Specific Instruction-set Processor (ASIP) as a viable platform for embedded systems. Extensible ASIPs allow the user...
Ajay K. Verma, Philip Brisk, Paolo Ienne