Abstract— Autonomous mobile robots are deployed in a variety of application domains, resulting in scenario specific implementations. However these systems share common component...
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
This paper presents the language and software environment LEADSTO that has been developed to model and simulate the dynamics of Multi-Agent Systems (MAS) in terms of both qualitati...
Tibor Bosse, Catholijn M. Jonker, Lourens van der ...
This paper presents a methodology for accurately characterizing the system calls of an operating system for embedded applications. Characterization consists of two phases: measure...
In order to make good strategies, soccer coaches analyze the archives of matches, which can be effectively considered as a set of trajectories. We can extract several useful infor...