Sciweavers

903 search results - page 78 / 181
» Usability inspection methods
Sort
View
ICCAD
2005
IEEE
121views Hardware» more  ICCAD 2005»
15 years 7 months ago
Transition-by-transition FSM traversal for reachability analysis in bounded model checking
Abstract— In bounded model checking (BMC)-based verification flows lack of reachability constraints often leads to false negatives. At present, it is daily practice of a veri...
Minh D. Nguyen, Dominik Stoffel, Markus Wedler, Wo...
DAC
2009
ACM
15 years 5 months ago
Endosymbiotic computing: enabling surrogate GUI and cyber-physical connectivity
Endosymbiotic Computing entails attaching an RF-enabled microcontroller module (endomodule) to an appliance such that it appears as a networked device in the cyber world. It enabl...
Pai H. Chou
ICDAR
2009
IEEE
15 years 5 months ago
A Dual Taxonomy for Defects in Digitized Historical Photos
Old photos may be affected by several types of defects. Manual restorers use their own taxonomy to classify damages by which a photo is affected, in order to apply the proper rest...
Edoardo Ardizzone, A. De Polo, Haris Dindo, Giusep...
IAT
2007
IEEE
15 years 4 months ago
Network Intrusion Detection by Means of Community of Trusting Agents
We apply advanced agent trust modeling techniques to identify malicious traffic in computer networks. Our work integrates four state-of-the-art techniques from anomaly detection,...
Martin Rehák, Michal Pechoucek, Karel Barto...
IROS
2007
IEEE
112views Robotics» more  IROS 2007»
15 years 4 months ago
Orchestrating concurrency in robot swarms
— A functional approach to programming robot swarms brings with it well-defined properties that allow for automated concurrency and distributed execution. Further, the particula...
Anthony Cowley, Camillo J. Taylor