Sciweavers

2357 search results - page 412 / 472
» Computing Refactorings of Behavior Models
Sort
View
IMC
2009
ACM
14 years 3 months ago
An analysis of packet sampling in the frequency domain
Packet sampling techniques introduce measurement errors that should be carefully handled in order to correctly characterize the network behavior. In the literature several works h...
Luigi Alfredo Grieco, Chadi Barakat
ICRA
2008
IEEE
128views Robotics» more  ICRA 2008»
14 years 2 months ago
A point-based POMDP planner for target tracking
— Target tracking has two variants that are often studied independently with different approaches: target searching requires a robot to find a target initially not visible, and ...
David Hsu, Wee Sun Lee, Nan Rong
CSFW
2007
IEEE
14 years 2 months ago
Compositional Security for Task-PIOAs
Task-PIOA is a modeling framework for distributed systems with both probabilistic and nondeterministic behaviors. It is suitable for cryptographic applications because its task-bas...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...
ICRA
2007
IEEE
138views Robotics» more  ICRA 2007»
14 years 2 months ago
Where's Waldo? Sensor-Based Temporal Logic Motion Planning
— Given a robot model and a class of admissible environments, this paper provides a framework for automatically and verifiably composing controllers that satisfy high level task...
Hadas Kress-Gazit, Georgios E. Fainekos, George J....
VTC
2007
IEEE
14 years 2 months ago
Power Optimization of IDMA Systems with Different Target BER Constraints
— Interleave Division Multiple Access (IDMA) is a promising air interface for future wireless networks. Optimization of access schemes regarding cross user aspects is also a topi...
Petra Weitkemper, Karl-Dirk Kammeyer