We present a novel approach which facilitates formal verification of component-based software application families using model checking. This approach enables effective composition...
Advances in computer graphics hardware and algorithms, visualization, and interactive techniques for analysis offer the components for a highly integrated, efficient real-time 3D ...
David Koller, Peter Lindstrom, William Ribarsky, L...
— In this paper we present a novel method for visual scanning and target tracking by means of independent pan-tilt cameras which mimic the chameleon visual system. We present a s...
Ofir Avni, Francesco Borrelli, Gadi Katzir, Ehud R...
Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...
This paper describes how cognitive modeling can be exploited in the design of software agents that support naval training sessions. The architecture, specifications, and embedding...
Willem A. van Doesburg, Annerieke Heuvelink, Egon ...