Sciweavers

3555 search results - page 191 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
CAV
2012
Springer
270views Hardware» more  CAV 2012»
13 years 6 months ago
Automated Termination Proofs for Java Programs with Cyclic Data
Abstract. In earlier work, we developed a technique to prove termination of Java programs automatically: first, Java programs are automatically transformed to term rewrite systems...
Marc Brockschmidt, Richard Musiol, Carsten Otto, J...
CORR
2002
Springer
114views Education» more  CORR 2002»
15 years 3 months ago
Offline Specialisation in Prolog Using a Hand-Written Compiler Generator
The so called "cogen approach" to program specialisation, writing a compiler generator instead of a specialiser, has been used with considerable success in partial evalu...
Michael Leuschel, Jesper Jørgensen, Wim Van...
BNCOD
2006
85views Database» more  BNCOD 2006»
15 years 5 months ago
Trust Obstacle Mitigation for Database Systems
This paper introduces the Trust Obstacle Mitigation Model (TOMM), which uses the concept of trust assumptions to derive security obstacles, and the concept of misuse cases to model...
Victor Page, Robin C. Laney, Maurice Dixon, Charle...
ESSMAC
2003
Springer
15 years 9 months ago
Simultaneous Localization and Surveying with Multiple Agents
We apply a constrained Hidden Markov Model architecture to the problem of simultaneous localization and surveying from sensor logs of mobile agents navigating in unknown environmen...
Sam T. Roweis, Ruslan Salakhutdinov
ACMIDC
2009
15 years 8 months ago
Drama prototyping for the design of urban interactive systems for children
In this paper, we present Wi-swing, a case study approach in designing a networked playground for children located in a public garden. The approach adopted in the case study is ba...
Andrea Alessandrini, Antonio Rizzo, Elisa Rubegni