Sciweavers

1156 search results - page 138 / 232
» The PENG System: Practice and Experience
Sort
View
JOT
2006
76views more  JOT 2006»
14 years 11 months ago
Architecture-Related Requirements
The engineering of architecture-related requirements has proven to be a very difficult task for requirements engineers. It is also a task that experience has shown could use signi...
Donald Firesmith, Peter Capell
SCN
2008
Springer
142views Communications» more  SCN 2008»
14 years 11 months ago
Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries
We present an implementation of the protocol of Lindell and Pinkas for secure two-party computation which is secure against malicious adversaries [13]. This is the first running sy...
Yehuda Lindell, Benny Pinkas, Nigel P. Smart
STTT
2008
86views more  STTT 2008»
14 years 11 months ago
Properties of state spaces and their applications
Explicit model checking algorithms explore the full state space of a system. State spaces are usually treated as directed graphs without any specific features. We gather a large co...
Radek Pelánek
AUTOMATICA
2002
91views more  AUTOMATICA 2002»
14 years 11 months ago
Closed-loop identification with an unstable or nonminimum phase controller
In many practical cases, the identification of a system is done in closed loop with some controller. In this paper, we show that the internal stability of the resulting model, in ...
Benoît Codrons, Brian D. O. Anderson, Michel...
PUC
2007
135views more  PUC 2007»
14 years 11 months ago
Towards a Multimodal Interaction Space: categorisation and applications
Based on many experiences of developing interactive systems by the authors, a framework for the description and analysis of interaction has been developed. The dimensions of this m...
Bert Bongers, Gerrit C. van der Veer