Sciweavers

303 search results - page 46 / 61
» Context-Sensitive Call Control Using Constraints and Rules
Sort
View
GLOBECOM
2008
IEEE
14 years 3 months ago
MACA-U: A Media Access Protocol for Underwater Acoustic Networks
—Unlike terrestrial wireless communication which uses radio waves, underwater communication relies on acoustic waves. The long latency and limited bandwidth pose great challenges...
Hai-Heng Ng, Wee-Seng Soh, Mehul Motani
COMPSAC
2009
IEEE
14 years 28 days ago
Tamper Resistance for Software Defined Radio Software
The security of software defined radio (SDR) software is essential to the trustworthiness of the overall radio system. When designing and developing security solutions for SDR sof...
Shucai Xiao, Jung-Min Park, Yanzhu Ye
AAAI
1998
13 years 10 months ago
Multimodal Reasoning for Automatic Model Construction
This paper describes a program called Pret that automates system identification, the process of finding a dynamical model of a black-box system. Pret performs both structural iden...
Reinhard Stolle, Elizabeth Bradley
ENTCS
2008
106views more  ENTCS 2008»
13 years 9 months ago
Verifying Test-Hypotheses: An Experiment in Test and Proof
HOL-TestGen is a specification and test case generation environment extending the interactive theorem prover Isabelle/HOL. The HOL-TestGen method is two-staged: first, the origina...
Achim D. Brucker, Lukas Brügger, Burkhart Wol...
AAAI
1998
13 years 10 months ago
An Expert System for Alarm System Planning
This paper discusses the design and implementation of ESSPL, an expert system which generates security plans for alarm systems (Figure 1). Security planning is the task of determi...
Akira Tsurushima, Kenji Urushima, Daigo Sakata, Hi...