Sciweavers

714 search results - page 131 / 143
» Verification and Compliance Testing
Sort
View
JIRS
2007
229views more  JIRS 2007»
15 years 9 days ago
Unmanned Vehicle Controller Design, Evaluation and Implementation: From MATLAB to Printed Circuit Board
A detailed step-by-step approach is presented to optimize, standardize, and automate the process of unmanned vehicle controller design, evaluation, validation and verification, fol...
Daniel Ernst, Kimon P. Valavanis, Richard Garcia, ...
ENTCS
2002
107views more  ENTCS 2002»
15 years 6 days ago
Monitoring, Checking, and Steering of Real-Time Systems
The MaC system has been developed to provide assurance that a target program is running correctly with respect to formal requirements specification. This is achieved by monitoring...
Moonjoo Kim, Insup Lee, Usa Sammapun, Jangwoo Shin...
PR
2002
202views more  PR 2002»
15 years 1 days ago
Illumination color covariant locale-based visual object retrieval
Search by Object Model -- finding an object inside a target image -- is a desirable and yet difficult mechanism for querying multimedia data. An added difficulty is that objects c...
Mark S. Drew, Ze-Nian Li, Zinovi Tauber
TSE
1998
131views more  TSE 1998»
15 years 1 days ago
Experiences Using Lightweight Formal Methods for Requirements Modeling
—This paper describes three case studies in the lightweight application of formal methods to requirements modeling for spacecraft fault protection systems. The case studies diffe...
Steve M. Easterbrook, Robyn R. Lutz, Richard Covin...
127
Voted
CORR
2010
Springer
225views Education» more  CORR 2010»
14 years 12 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...