Sciweavers

84 search results - page 10 / 17
» Application of design for verification with concurrency cont...
Sort
View
FORTE
1994
13 years 8 months ago
Proving the value of formal methods
The record of successful applications of formal verification techniques is slowly growing. Our ultimate aim, however, is not to perform small pilot projects that show that verific...
Gerard J. Holzmann
ISSRE
2010
IEEE
13 years 5 months ago
Automata-Based Verification of Security Requirements of Composite Web Services
— With the increasing reliance of complex real-world applications on composite web services assembled from independently developed component services, there is a growing need for...
Hongyu Sun, Samik Basu, Vasant Honavar, Robyn R. L...
COMPSAC
2010
IEEE
13 years 5 months ago
Representing and Reasoning about Web Access Control Policies
The advent of emerging technologies such as Web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effect...
Gail-Joon Ahn, Hongxin Hu, Joohyung Lee, Yunsong M...
ICRA
2000
IEEE
101views Robotics» more  ICRA 2000»
13 years 11 months ago
Towards Programming Tools for Robots that Integrate Probabilistic Computation and Learning
This paper describes a programming language extension of C++, called CES, specifically targeted towards mobile robot control. CES’s design is motivated by a recent series of su...
Sebastian Thrun
ICVS
2001
Springer
13 years 11 months ago
A Modular Software Architecture for Real-Time Video Processing
An increasing number of computer vision applications require on-line processing of data streams, preferably in real-time. This trend is fueled by the mainstream availability of low...
Alexandre R. J. François, Gérard G. ...