Sciweavers

8337 search results - page 1537 / 1668
» Reasoning With Characteristic Models
Sort
View
123
Voted
CSEE
2000
Springer
15 years 9 months ago
Technology Transfer Issues for Formal Methods of Software Specification
Accurate and complete requirements specifications are crucial for the design and implementation of high-quality software. Unfortunately, the articulation and verification of softw...
Ken Abernethy, John C. Kelly, Ann E. Kelley Sobel,...
145
Voted
ICRA
1999
IEEE
114views Robotics» more  ICRA 1999»
15 years 8 months ago
Smoother Based 3-D Attitude Estimation for Mobile Robot Localization
The mobile robot localization problem is decomposed into two stages attitude estimation followed by position estimation. The innovation of our method is the use of a smoother, in ...
Stergios I. Roumeliotis, Gaurav S. Sukhatme, Georg...
AGENTS
1999
Springer
15 years 8 months ago
A Personal News Agent That Talks, Learns and Explains
Most work on intelligent information agents has thus far focused on systems that are accessible through the World Wide Web. As demanding schedules prohibit people from continuous ...
Daniel Billsus, Michael J. Pazzani
120
Voted
RAID
1999
Springer
15 years 8 months ago
Defending against a Denial-of-Service Attack on TCP
In this paper we propose a real-time anomaly detection method for detecting TCP SYN-flooding attacks. This method is based on the intensities of SYN segments which are measured on...
Pars Mutaf
SIGOPSE
1998
ACM
15 years 8 months ago
Nested Java processes: OS structure for mobile code
The majority of work on protection in single-language mobile code environments focuses on information security issues and depends on the language environment for solutions to the ...
Patrick Tullmann, Jay Lepreau
« Prev « First page 1537 / 1668 Last » Next »