Sciweavers

9124 search results - page 1699 / 1825
» Requirements-Based Design Evaluation
Sort
View
87
Voted
NDSS
2007
IEEE
15 years 7 months ago
Generic Application-Level Protocol Analyzer and its Language
Application-level protocol analyzers are important components in tools such as intrusion detection systems, firewalls, and network monitors. Currently, protocol analyzers are wri...
Nikita Borisov, David Brumley, Helen J. Wang, John...
ROMAN
2007
IEEE
175views Robotics» more  ROMAN 2007»
15 years 7 months ago
BuildBot: Robotic Monitoring of Agile Software Development Teams
Abstract - In this paper, we describe BuildBot, a robotic interface developed to assist with the continuous integration process utilized by agile software development teams. BuildB...
Ruth Ablett, Ehud Sharlin, Frank Maurer, Jörg...
111
Voted
VTC
2007
IEEE
105views Communications» more  VTC 2007»
15 years 7 months ago
Random Beamforming OFDMA for Future Generation Cellular Communication Systems
—This paper presents a downlink performance analysis of a Layered Random Beamforming (LRB) - MIMO-OFDMA Physical Layer (PHY) as applicable to future generation wireless communica...
Congzheng Han, Angela Doufexi, Simon Armour, Joe M...
124
Voted
ATAL
2007
Springer
15 years 7 months ago
Commitment-driven distributed joint policy search
Decentralized MDPs provide powerful models of interactions in multi-agent environments, but are often very difficult or even computationally infeasible to solve optimally. Here we...
Stefan J. Witwicki, Edmund H. Durfee
111
Voted
ATAL
2007
Springer
15 years 7 months ago
Modelling the provenance of data in autonomous systems
Determining the provenance of data, i.e. the process that led to that data, is vital in many disciplines. For example, in science, the process that produced a given result must be...
Simon Miles, Steve Munroe, Michael Luck, Luc Morea...
« Prev « First page 1699 / 1825 Last » Next »