Sciweavers

3770 search results - page 693 / 754
» Building a Stochastic Dynamic Model of Application Use
Sort
View
ICSE
2008
IEEE-ACM
14 years 8 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
FLAIRS
2008
13 years 10 months ago
Conditional and Composite Constraints with Preferences
Preferences in constraint problems are common but significant in many real world applications. In this paper, we extend our conditional and composite CSP (CCCSP) framework, managi...
Malek Mouhoub, Amrudee Sukpan
ATAL
2008
Springer
13 years 9 months ago
Conviviality masks in multiagent systems
In this paper we study tools for conviviality to develop user-friendly multiagent systems. First, we show how to use the social-cognitive concept of conviviality in multiagent sys...
Patrice Caire, Serena Villata, Guido Boella, Leend...
VRST
2004
ACM
14 years 1 months ago
Animating reactive motions for biped locomotion
In this paper, we propose a new method for simulating reactive motions for running or walking human figures. The goal is to generate realistic animations of how humans compensate...
Taku Komura, Howard Leung, James Kuffner
BMCBI
2008
188views more  BMCBI 2008»
13 years 8 months ago
anNET: a tool for network-embedded thermodynamic analysis of quantitative metabolome data
Background: Compared to other omics techniques, quantitative metabolomics is still at its infancy. Complex sample preparation and analytical procedures render exact quantification...
Nicola Zamboni, Anne Kümmel, Matthias Heinema...