Sciweavers

3555 search results - page 160 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
CDC
2010
IEEE
170views Control Systems» more  CDC 2010»
14 years 10 months ago
Motion planning with hybrid dynamics and temporal goals
In this paper, we consider the problem of motion planning for mobile robots with nonlinear hybrid dynamics, and high-level temporal goals. We use a multi-layered synergistic framew...
Amit Bhatia, Lydia E. Kavraki, Moshe Y. Vardi
MUC
1992
15 years 7 months ago
GE NLToolset: description of the system as used for MUC-4
The GE NLTooLsET is a set of text interpretation tools designed to be easily adapted to new domains. This report summarizes the system and its performance on the MUG-4 task . INTR...
George B. Krupka, Paul S. Jacobs, Lisa F. Rau, Loi...
TACAS
2010
Springer
162views Algorithms» more  TACAS 2010»
15 years 10 months ago
Computing the Leakage of Information-Hiding Systems
We address the problem of computing the information leakage of a system in an efficient way. We propose two methods: one based on reducing the problem to reachability, and the oth...
Miguel E. Andrés, Catuscia Palamidessi, Pet...
IVEVA
2004
15 years 5 months ago
Using Hardware-based Voice Recognition to Interact with a Virtual Environment
This paper presents ongoing research on human-computer interaction in virtual environments using voice recognition systems. The paper starts describing voice recognition technologi...
Miguel A. Garcia-Ruiz, Cesar R. Bustos-Mendoza
CORR
2010
Springer
71views Education» more  CORR 2010»
15 years 1 months ago
Equality, Quasi-Implicit Products, and Large Eliminations
This paper presents a type theory with a form of equality reflection: provable equalities can be used to coerce the type of a term. Coercions and other annotations, including impl...
Vilhelm Sjöberg, Aaron Stump