Sciweavers

1352 search results - page 41 / 271
» Designing Security Requirements Models Through Planning
Sort
View
ICRA
2003
IEEE
111views Robotics» more  ICRA 2003»
14 years 2 months ago
Multi-robot team response to a multi-robot opponent team
Adversarial multi-robot problems, where teams of robots compete with one another, require the development of approaches that span all levels of control and integrate algorithms ra...
James Bruce, Michael H. Bowling, Brett Browning, M...
APSEC
2006
IEEE
14 years 2 months ago
Security-Oriented Service Composition and Evolution
This paper introduces a framework for security-oriented software service composition and evolution. Key building blocks of the framework are a semantic model for specifying the se...
Jun Han, Khaled M. Khan
EUSFLAT
2003
110views Fuzzy Logic» more  EUSFLAT 2003»
13 years 10 months ago
Fuzzy-neuro risk assessment of distributed real-time systems through formal and object-oriented systems modelling
The purpose of this paper is to advocate and encourage the application of fuzzy-neuro algorithms in the risk assessment of Distributed Real-Time (DRT) systems, where object-orient...
Atoosa P.-J. Thunem
ICVS
2003
Springer
14 years 2 months ago
Navigating through Logic-Based Scene Models for High-Level Scene Interpretations
This paper explores high-level scene interpretation with logic-based conceptual models. The main interest is in aggregates which describe interesting co-occurrences of physical obj...
Bernd Neumann, Thomas Weiss
ISSE
2010
13 years 7 months ago
URDAD as a semi-formal approach to analysis and design
The Use Case, Responsibility Driven Analysis and Design (URDAD) methodology is a methodology for technology neutral design generating the Platform Independent Model of the Object M...
Fritz Solms, Dawid Loubser