Sciweavers

236 search results - page 26 / 48
» Application of RT-DEVS in military
Sort
View
ICRA
2009
IEEE
185views Robotics» more  ICRA 2009»
14 years 5 months ago
Ad-hoc wireless network coverage with networked robots that cannot localize
— We study a fully distributed, reactive algorithm for deployment and maintenance of a mobile communication backbone that provides an area around a network gateway with wireless ...
Nikolaus Correll, Jonathan Bachrach, Daniel Vicker...
INFOCOM
2009
IEEE
14 years 5 months ago
Event Recognition in Sensor Networks by Means of Grammatical Inference
Abstract—Modern military and civilian surveillance applications should provide end users with the high level representation of events observed by sensors rather than with the raw...
Sahin Cem Geyik, Boleslaw K. Szymanski
ATAL
2009
Springer
14 years 5 months ago
Aerogility: an intelligent decision support system for managing service-based aftermarkets
This paper describes Aerogility - an intelligent decision support system for managing service-based aftermarkets. Aerogility uses multi-agent software technology to implement a dy...
Viet Dung Dang, Steve Osborn, Gary Vickers, Malcol...
DATE
2008
IEEE
100views Hardware» more  DATE 2008»
14 years 5 months ago
Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme
There have been serious concerns recently about the security of microchips from hardware trojan horse insertion during manufacturing. This issue has been raised recently due to ou...
Francis G. Wolff, Christos A. Papachristou, Swarup...
HOST
2008
IEEE
14 years 5 months ago
Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions
This paper addresses a new threat to the security of integrated circuits (ICs) used in safety critical, security and military systems. The migration of IC fabrication to low-cost ...
Xiaoxiao Wang, Mohammad Tehranipoor, Jim Plusquell...