Sciweavers

1512 search results - page 240 / 303
» When Suboptimal Rules
Sort
View
ATAL
2008
Springer
15 years 1 months ago
Decentralized coordination of automated guided vehicles
This paper approaches the issue of coordination of highly autonomous Automated Guided Vehicles (AGVs) working on an automated factory. These vehicles are used for goods delivery t...
David Herrero Pérez, Humberto Martín...
ATVA
2008
Springer
90views Hardware» more  ATVA 2008»
15 years 1 months ago
Tree Pattern Rewriting Systems
Classical verification often uses abstraction when dealing with data. On the other hand, dynamic XML-based applications have become pervasive, for instance with the ever growing im...
Blaise Genest, Anca Muscholl, Olivier Serre, Marc ...
CARDIS
2008
Springer
165views Hardware» more  CARDIS 2008»
15 years 1 months ago
Malicious Code on Java Card Smartcards: Attacks and Countermeasures
When it comes to security, an interesting difference between Java Card and regular Java is the absence of an on-card bytecode verifier on most Java Cards. In principle this opens u...
Wojciech Mostowski, Erik Poll
CEAS
2008
Springer
15 years 1 months ago
A Campaign-based Characterization of Spamming Strategies
This paper presents a methodology for the characterization of spamming strategies based on the identification of spam campaigns. To deeply understand how spammers abuse network re...
Pedro Calais, Douglas Pires, Dorgival Olavo Guedes...
ER
2007
Springer
138views Database» more  ER 2007»
15 years 26 days ago
Model-Driven Development Based Transformation of Stereotyped Class Diagrams to XML Schemas in a Healthcare Context
The health sector uses clinical guidelines as instruments for helping decision making. We are interested in the development of a ubiquitous decision support system (UDSS) for clini...
Eladio Domínguez, Jorge Lloret, Beatriz P&e...