Sciweavers

1352 search results - page 60 / 271
» Designing Security Requirements Models Through Planning
Sort
View
IFIP
2010
Springer
13 years 3 months ago
A Formal Analysis of Authentication in the TPM
The Trusted Platform Module (TPM) is a hardware chip designed to enable computers to achieve a greater level of security than is possible in software alone. To this end, the TPM pr...
Stéphanie Delaune, Steve Kremer, Mark Dermo...
RE
2010
Springer
13 years 3 months ago
A UML-based static verification framework for security
Secure software engineering is a new research area that has been proposed to address security issues during the development of software systems. This new area of research advocates...
Igor Siveroni, Andrea Zisman, George Spanoudakis
AAMAS
2005
Springer
14 years 2 months ago
Experiments in Subsymbolic Action Planning with Mobile Robots
The ability to determine a sequence of actions in order to reach a particular goal is of utmost importance to mobile robots. One major problem with symbolic planning approaches re...
John Pisokas, Ulrich Nehmzow
ICRA
2000
IEEE
176views Robotics» more  ICRA 2000»
14 years 14 days ago
RRT-Connect: An Efficient Approach to Single-Query Path Planning
A simple and efficient randomized algorithm is presented for solving single-query path planning problems in high-dimensional configuration spaces. The method works by incrementall...
James J. Kuffner Jr., Steven M. LaValle
SAC
2010
ACM
14 years 3 months ago
Adaptive internet services through performance and availability control
Cluster-based multi-tier systems provide a means for building scalable Internet services. Building adaptive Internet services that are able to apply appropriate system sizing and ...
Jean Arnaud, Sara Bouchenak