Sciweavers

2043 search results - page 303 / 409
» Reasoning About Security Models
Sort
View
109
Voted
GIS
2000
ACM
15 years 4 months ago
The NASA Digital Earth Testbed
The goal of Digital Earth (www.digitalearth.gov) is to create a virtual representation of our planet that enables a person to explore and interact with the vast amounts of natural...
Jeff de La Beaujardière, Horace Mitchell, R...
124
Voted
DLOG
2008
15 years 3 months ago
Fuzzy Description Logics for Bilateral Matchmaking in e-Marketplaces
We present a novel Fuzzy Description Logic (DL) based approach to automate matchmaking in e-marketplaces. We model traders' preferences with the aid of Fuzzy DLs and, given a ...
Azzurra Ragone, Umberto Straccia, Fernando Bobillo...
115
Voted
SEC
2004
15 years 2 months ago
Interactive Access Control for Web Services
Business Processes for Web Services (BPEL4WS) are the new paradigms for lightweight enterprise integration. They cross organizational boundaries and are provided by entities that s...
Hristo Koshutanski, Fabio Massacci
96
Voted
ENTCS
2007
143views more  ENTCS 2007»
15 years 20 days ago
Formal Fault Tree Analysis - Practical Experiences
Safety is an important requirement for many modern systems. To ensure safety of complex critical systems, well-known safety analysis methods have been formalized. This holds in pa...
Frank Ortmeier, Gerhard Schellhorn
120
Voted
ICRA
2010
IEEE
126views Robotics» more  ICRA 2010»
14 years 11 months ago
Simulation-based LQR-trees with input and state constraints
— We present an algorithm that probabilistically covers a bounded region of the state space of a nonlinear system with a sparse tree of feedback stabilized trajectories leading t...
Philipp Reist, Russ Tedrake