Sciweavers

284 search results - page 50 / 57
» Explanation-based Scenario Generation for Reactive System Mo...
Sort
View
CRITIS
2007
13 years 9 months ago
A Malware Detector Placement Game for Intrusion Detection
We propose and investigate a game-theoretic approach to the malware filtering and detector placement problem which arises in network security. Our main objective is to develop opt...
Stephan Schmidt, Tansu Alpcan, Sahin Albayrak, Tam...
WSC
2008
13 years 9 months ago
Introducing age-based parameters into simulations of crowd dymanics
Very few crowds consist of individuals who are exactly the same. Defining variables, such as age, and how they affect an individual's movement, could increase realism in simu...
D. J. Kaup, Thomas L. Clarke, Rex Oleson, Linda C....
ASAP
2005
IEEE
169views Hardware» more  ASAP 2005»
14 years 1 months ago
Alleviating the Data Memory Bandwidth Bottleneck in Coarse-Grained Reconfigurable Arrays
It is widely known that parallel operation execution in multiprocessor systems generates a respective increase in memory accesses. Since the memory and bus subsystems provide a li...
Grigoris Dimitroulakos, Michalis D. Galanis, Costa...
CDC
2009
IEEE
173views Control Systems» more  CDC 2009»
14 years 2 days ago
Fault tolerant control allocation for a thruster-controlled floating platform using parametric programming
— The task in control allocation is to determine how to generate a specified generalized force from a redundant set of control effectors where the associated actuator control in...
Jørgen Spjøtvold, Tor Arne Johansen
RE
2009
Springer
13 years 12 months ago
Use Case to Source Code Traceability: The Developer Navigation View Point
Requirements traceability is a challenge for modern software projects where task dependencies and technical experspread across system developers, abstract model representations su...
Inah Omoronyia, Guttorm Sindre, Marc Roper, John D...