Sciweavers

1352 search results - page 47 / 271
» Designing Security Requirements Models Through Planning
Sort
View
AAAI
2008
13 years 11 months ago
Adaptive Control for Autonomous Underwater Vehicles
We describe a novel integration of Planning with Probabilistic State Estimation and Execution resulting in a unified representational and computational framework based on declarat...
Conor McGann, Frederic Py, Kanna Rajan, John Ryan,...
ICSE
2001
IEEE-ACM
14 years 1 months ago
Conceptual Modeling through Linguistic Analysis Using LIDA
Despite the advantages that object technology can provide to the software development community and its customers, the fundamental problems associated with identifying objects, th...
Scott P. Overmyer, Benoit Lavoie, Owen Rambow
GLOBECOM
2006
IEEE
14 years 2 months ago
Multi-Stage Investment Decision under Contingent Demand for Networking Planning
Telecommunication companies, such as Internet and cellular service providers, are seeing rapid and uncertain growth of traffic routed through their networks. It has become a chall...
Miguel F. Anjos, Michael Desroches, Anwar Haque, O...
AAAI
2012
11 years 11 months ago
POMDPs Make Better Hackers: Accounting for Uncertainty in Penetration Testing
Penetration Testing is a methodology for assessing network security, by generating and executing possible hacking attacks. Doing so automatically allows for regular and systematic...
Carlos Sarraute, Olivier Buffet, Jörg Hoffman...
EDBTW
2010
Springer
14 years 4 days ago
Flexible Dataspace Management Through Model Management
The vision of dataspaces has been articulated as providing various of the benefits of classical data integration but with reduced up-front costs, which, combined with opportunitie...
Cornelia Hedeler, Khalid Belhajjame, Lu Mao, Norma...