Sciweavers

488 search results - page 30 / 98
» Derivation of Java Monitors
Sort
View
ICRA
2003
IEEE
111views Robotics» more  ICRA 2003»
15 years 7 months ago
Fuzzy Petri nets for monitoring and recovery
- In this paper, we propose a unitary tool for modeling and analysis of discrete event systems monitoring. Uncertain knowledge of such tasks asks specific reasoning and adapted fuz...
Daniel I. Racoceanu, Eugenia Minca, Noureddine Zer...
118
Voted
RAS
2008
84views more  RAS 2008»
15 years 1 months ago
Monitoring the execution of robot plans using semantic knowledge
Even the best laid plans can fail, and robot plans executed in real world domains tend to do so often. The ability of a robot to reliably monitor the execution of plans and detect...
Abdelbaki Bouguerra, Lars Karlsson, Alessandro Saf...
94
Voted
DSN
2008
IEEE
15 years 8 months ago
On localization attacks to Internet Threat Monitors: An information-theoretic framework
Internet Threat Monitoring (ITM) systems are a widely deployed facility to detect, analyze, and characterize dangerous Internet threats such as worms and distributed denial-of-ser...
Wei Yu, Nan Zhang 0004, Xinwen Fu, Riccardo Bettat...
ICNS
2006
IEEE
15 years 8 months ago
On Monitoring of End-to-End Packet Reordering over the Internet
End-to-end reordering of packets on Internet is investigated. Packet streams transferred over the Internet are used to analyze the long-term and shortterm trends in reordering. Re...
Bin Ye, Anura P. Jayasumana, Nischal M. Piratla
WECWIS
1999
IEEE
102views ECommerce» more  WECWIS 1999»
15 years 6 months ago
Monitoring and Prediction of Network Performance
Analysis of network and application pegormance is traditionally based on mathematical models derived from first principles. Such models are usually complex, diflcult to use, and d...
Bjorn Frogner, Alexander B. Cannara