Sciweavers

2861 search results - page 537 / 573
» Constraint Programming
Sort
View
ICRA
2008
IEEE
165views Robotics» more  ICRA 2008»
14 years 4 months ago
Comparison of robotic and clinical motor function improvement measures for sub-acute stroke patients
Abstract— In this paper, preliminary results in motor function improvement for four sub-acute stroke patients that underwent a hybrid robotic and traditional rehabilitation progr...
Ozkan Celik, Marcia Kilchenman O'Malley, Corwin Bo...
KBSE
2007
IEEE
14 years 4 months ago
Tools for model-based security engineering: models vs. code
We present tools to support model-based security engineering on both the model and the code level. In the approach supported by these tools, one firstly specifies the securitycr...
Jan Jürjens, Yijun Yu
ISPASS
2006
IEEE
14 years 3 months ago
Critical path analysis of the TRIPS architecture
Fast, accurate, and effective performance analysis is essential for the design of modern processor architectures and improving application performance. Recent trends toward highly...
Ramadass Nagarajan, Xia Chen, Robert G. McDonald, ...
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
14 years 3 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
TAICPART
2006
IEEE
144views Education» more  TAICPART 2006»
14 years 3 months ago
Testing the Implementation of Business Rules Using Intensional Database Tests
One of the key roles of any information system is to enforce the business rules and policies set by the owning organisation. As for any important functionality, it is necessary to...
David Willmor, Suzanne M. Embury