Sciweavers

431 search results - page 76 / 87
» A Modeling Methodology for Conflict Control in Multi-Agent S...
Sort
View
SCHEDULING
2008
89views more  SCHEDULING 2008»
13 years 6 months ago
On-line decision support for take-off runway scheduling with uncertain taxi times at London Heathrow airport
: This paper addresses the challenge of building an automated decision support methodology to tackle the complex problem faced every day by runway controllers at London Heathrow Ai...
Jason A. D. Atkin, Edmund K. Burke, John S. Greenw...
ICSE
2008
IEEE-ACM
14 years 6 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
CCS
2009
ACM
14 years 1 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino
SI3D
2006
ACM
14 years 20 days ago
ShowMotion: camera motion based 3D design review
We describe a new interactive system for 3D design review, built to exploit the visual perception cue of motion parallax, in order to enhance shape perception and aesthetic evalua...
Nicholas Burtnyk, Azam Khan, George W. Fitzmaurice...
IV
2005
IEEE
149views Visualization» more  IV 2005»
14 years 9 days ago
Visualisation Techniques for Users and Designers of Layout Algorithms
Visualisation systems consisting of a set of components through which data and interaction commands flow have been explored by a number of researchers. Such hybrid and multistage ...
Greg Ross, Alistair Morrison, Matthew Chalmers