Sciweavers

867 search results - page 146 / 174
» A Model for Dynamic Shape and Its Applications
Sort
View
117
Voted
HICSS
2008
IEEE
135views Biometrics» more  HICSS 2008»
15 years 10 months ago
Formal Foundation of Workflow Hyperpaths and a Graph Search Algorithm for Workflow Hyperpath Generation
While executing a process, many decisions are taken at its various decision points for selecting paths. There is a need for understanding and analyzing on various paths that emana...
Sinnakkrishnan Perumal, Ambuj Mahanti
189
Voted
IROS
2007
IEEE
411views Robotics» more  IROS 2007»
15 years 10 months ago
Experimental kinematics for wheeled skid-steer mobile robots
— This work aims at improving real-time motion control and dead-reckoning of wheeled skid-steer vehicles by considering the effects of slippage, but without introducing the compl...
Anthony Mandow, Jorge L. Martínez, Jes&uacu...
127
Voted
SAFECOMP
2007
Springer
15 years 9 months ago
Controller Architecture for Safe Cognitive Technical Systems
Abstract. Cognition of technical systems, as the ability to perceive situations, to learn about favorable behavior, and to autonomously generate decisions, adds new attributes to s...
Sebastian Kain, Hao Ding, Frank Schiller, Olaf Stu...
119
Voted
PVLDB
2008
112views more  PVLDB 2008»
15 years 3 months ago
P2P logging and timestamping for reconciliation
In this paper, we address data reconciliation in peer-to-peer (P2P) collaborative applications. We propose P2P-LTR (Logging and Timestamping for Reconciliation) which provides P2P...
Mounir Tlili, William Kokou Dedzoe, Esther Pacitti...
135
Voted
ICSE
2008
IEEE-ACM
16 years 3 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens