Sciweavers

809 search results - page 134 / 162
» Requirements by Contracts allow Automated System Testing
Sort
View
MP
2010
135views more  MP 2010»
14 years 10 months ago
An inexact Newton method for nonconvex equality constrained optimization
Abstract We present a matrix-free line search algorithm for large-scale equality constrained optimization that allows for inexact step computations. For sufficiently convex problem...
Richard H. Byrd, Frank E. Curtis, Jorge Nocedal
IROS
2008
IEEE
93views Robotics» more  IROS 2008»
15 years 6 months ago
An experimental study of station keeping on an underactuated ASV
— Dynamic positioning is an important application for marine vehicles that do not have the luxury of anchoring or mooring themselves. Such vehicles are usually large and have arr...
Arvind Pereira, Jnaneshwar Das, Gaurav S. Sukhatme
HICSS
2002
IEEE
136views Biometrics» more  HICSS 2002»
15 years 4 months ago
Using XML to Facilitate Information Management across Multiple Local Government Agencies
The main barriers to the level of electronic data interchange required to seamlessly integrate services offered by legacy systems in an Internet environment are the need for appli...
G. M. Bryan, Joanne M. Curry, Carolyn McGregor, D....
SEMWEB
2007
Springer
15 years 5 months ago
Cultural Adaptivity for the Semantic Web
Our research explores the possibilities for factoring culture into user models, working towards cultural adaptivity in the semantic web. The aim is to represent the user’s positi...
Katharina Reinecke
ESORICS
2007
Springer
15 years 6 months ago
Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter Control
Abstract. From a security standpoint, it is preferable to implement least privilege network security policies in which only the bare minimum of TCP/UDP ports on internal hosts are ...
Paul Z. Kolano