Sciweavers

2123 search results - page 298 / 425
» Composition of Cyber-Physical Systems
Sort
View
124
Voted
MHCI
2009
Springer
15 years 11 months ago
An evaluation of authoring interfaces for image-based navigation
We present the development and evaluation of an authoring system for image-based pedestrian navigation which lets authors take pictures and annotate instructions on the go in thre...
Benjamin Walther-Franks, Dirk Wenig, Rainer Malaka...
SPIN
2009
Springer
15 years 11 months ago
Symbolic Analysis via Semantic Reinterpretation
Abstract. The paper presents a novel technique to create implementations of the basic primitives used in symbolic program analysis: forward symbolic evaluation, weakest liberal pre...
Junghee Lim, Akash Lal, Thomas W. Reps
ACSD
2008
IEEE
108views Hardware» more  ACSD 2008»
15 years 11 months ago
PicNIc - Pi-calculus non-interference checker
PICNIC is a tool for verifying security properties of systems, namely non-interference properties of processes expressed as terms of the π-calculus with two security levels and d...
Silvia Crafa, Matteo Mio, Marino Miculan, Carla Pi...
DATE
2008
IEEE
106views Hardware» more  DATE 2008»
15 years 11 months ago
Modeling Event Stream Hierarchies with Hierarchical Event Models
Compositional Scheduling Analysis couples local scheduling analysis via event streams. While local analysis has successfully been extended to include hierarchical scheduling strat...
Jonas Rox, Rolf Ernst
157
Voted
ICASSP
2008
IEEE
15 years 11 months ago
Modulation forensics for wireless digital communications
Modulation forensics is to detect the modulation type in wireless communications without any prior information. It nds both military and civilian applications such as surveillance...
W. Sabrina Lin, K. J. Ray Liu