Sciweavers

1850 search results - page 215 / 370
» Design-for-debugging of application specific designs
Sort
View
ISSRE
2005
IEEE
14 years 3 months ago
Automated Checking for Windows Host Vulnerabilities
Evaluation of computing system security requires knowledge of the vulnerabilities present in the system and of potential attacks against the system. Vulnerabilities can be classif...
Matin Tamizi, Matt Weinstein, Michel Cukier
FSR
2005
Springer
88views Robotics» more  FSR 2005»
14 years 3 months ago
Efficient Braking Model for Off-Road Mobile Robots
In the near future, off-road mobile robots will feature high levels of autonomy which will render them useful for a variety of tasks on Earth and other planets. Many terrestrial a...
Mikhail Pivtoraiko, Alonzo Kelly, Peter Rander
ICCSA
2005
Springer
14 years 3 months ago
IMNET: An Experimental Testbed for Extensible Multi-user Virtual Environment Systems
Abstract. Multi-user virtual environment (MUVE) systems enable virtual participation in many applications. A MUVE usually is a complex system requiring technologies from 3D graphic...
Tsai-Yen Li, Mao-Yung Liao, Pai-Cheng Tao
MICAI
2005
Springer
14 years 3 months ago
Knowledge and Reasoning Supported by Cognitive Maps
A powerful and useful approach for modeling knowledge and qualitative reasoning is the Cognitive Map. The background of Cognitive Maps is the research about learning environments c...
Alejandro Peña Ayala, Humberto Sossa, Agust...
DOCENG
2004
ACM
14 years 3 months ago
Supporting virtual documents in just-in-time hypermedia systems
Many analytical or computational applications, especially legacy systems, create documents and display screens in response to user queries “dynamically” or in “real time”....
Li Zhang, Michael P. Bieber, David E. Millard, Vin...