Sciweavers

3555 search results - page 501 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
IJRR
2010
173views more  IJRR 2010»
15 years 3 months ago
Planning and Implementing Trajectories for Autonomous Underwater Vehicles to Track Evolving Ocean Processes Based on Predictions
Path planning and trajectory design for autonomous underwater vehicles (AUVs) is of great importance to the oceanographic research community because automated data collection is b...
Ryan N. Smith, Yi Chao, Peggy Li, David A. Caron, ...
HICSS
2003
IEEE
220views Biometrics» more  HICSS 2003»
15 years 10 months ago
Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks
This paper describes a novel approach using Hidden Markov Models (HMM) to detect complex Internet attacks. These attacks consist of several steps that may occur over an extended pe...
Dirk Ourston, Sara Matzner, William Stump, Bryan H...
OR
2010
Springer
15 years 3 months ago
Modeling organic carbon and carbon-mediated soil processes in DSSAT v4.5
Cropping systems models have evolved over the last four decades in response to the demand for modeling to address more complex questions, including issues on sustainable productio...
Cheryl H. Porter, J. W. Jones, S. Adiku, A. J. Gij...
IPCAI
2010
15 years 2 months ago
First Animal Cadaver Study for Interlocking of Intramedullary Nails under Camera Augmented Mobile C-arm
The Camera Augmented Mobile C-arm (CamC) system that augments a regular mobile C-arm by a video camera provides an overlay image of X-ray and video. This technology is expected to ...
Lejing Wang, Jürgen Landes, Simon Weidert, To...
PPDP
2009
Springer
15 years 12 months ago
Session types for linear multithreaded functional programming
The construction of reliable concurrent and distributed systems is an extremely difficult endeavour. For complex systems, it requires modular development strategies based on prec...
Vasco Thudichum Vasconcelos