Sciweavers

2317 search results - page 266 / 464
» DMVIS: Design, Modelling and Validation of Interactive Syste...
Sort
View
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
15 years 9 months ago
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the des...
Gerry V. Dozier, Douglas Brown, John Hurley, Kryst...
PATMOS
2005
Springer
15 years 9 months ago
Energy Characterization of Garbage Collectors for Dynamic Applications on Embedded Systems
Abstract. Modern embedded devices (e.g. PDAs, mobile phones) are now incorporating Java as a very popular implementation language in their designs. These new embedded systems inclu...
José Manuel Velasco, David Atienza, Katzali...
ICST
2010
IEEE
15 years 2 months ago
Automated and Scalable T-wise Test Case Generation Strategies for Software Product Lines
Abstract—Software Product Lines (SPL) are difficult to validate due to combinatorics induced by variability across their features. This leads to combinatorial explosion of the n...
Gilles Perrouin, Sagar Sen, Jacques Klein, Benoit ...
IROS
2006
IEEE
117views Robotics» more  IROS 2006»
15 years 10 months ago
Toward Active Cannulas: Miniature Snake-Like Surgical Robots
— We have developed a new class of continuously flexible snake-like robots, called active cannulas, that consist of several telescoping pre-curved superelastic tubes. The device...
Robert J. Webster III, Allison M. Okamura, Noah J....
WOA
2001
15 years 5 months ago
Coordinating Mobile Agents by means of Communicators
This paper proposes a coordination model, for both nd mobile agents, based on abstract structures called Communicators, entities which handle agent dialogue performed through ACL ...
Antonella Di Stefano, Corrado Santoro