Sciweavers

2468 search results - page 151 / 494
» On Model Checking Techniques for Randomized Distributed Syst...
Sort
View
109
Voted
CORR
2011
Springer
174views Education» more  CORR 2011»
14 years 10 months ago
Hide-and-Seek with Directional Sensing
: We consider a game played between a hider, who hides a static object in one of several possible positions in a bounded planar region, and a searcher who wishes to reach the objec...
Alessandro Borri, Shaunak Dattaprasad Bopardikar, ...
100
Voted
CONCUR
1989
Springer
15 years 7 months ago
Using the Temporal Logic RDL for Design Specifications
In summary, RDL is an intuitionistic temporal logic for the specification of requirements and design of time-dependent systems. Coverage of RDL includes a backward chaining theore...
Dov M. Gabbay, Ian M. Hodkinson, Anthony Hunter
158
Voted
EMS
2008
IEEE
15 years 5 months ago
Threat Modeling Revisited: Improving Expressiveness of Attack
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Drake Patrick Mirembe, Maybin K. Muyeba
119
Voted
CW
2004
IEEE
15 years 7 months ago
Watermarking a 3D Shape Model Defined as a Point Set
This paper discusses a method to watermark a 3D shape model defined as a set of unoriented points. Our approach is to perform frequency domain analysis of the shape of the 3D poin...
Ryutarou Ohbuchi, Akio Mukaiyama, Shigeo Takahashi
153
Voted
COMPSAC
2002
IEEE
15 years 8 months ago
A Graphically Based Language for Constructing, Executing and Analysing Models of Software Systems
With computer systems becoming ever larger and more complex, the cost and effort associated with their construction is increasing and the systems are now sufficiently complex that...
Robert John Walters