Sciweavers

1144 search results - page 63 / 229
» Feasibility Studies
Sort
View
DBSEC
2008
152views Database» more  DBSEC 2008»
13 years 11 months ago
An Attack Graph-Based Probabilistic Security Metric
To protect critical resources in today’s networked environments, it is desirable to quantify the likelihood of potential multi-step attacks that combine multiple vulnerabilities....
Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal,...
INFFUS
2006
112views more  INFFUS 2006»
13 years 10 months ago
Target motion analysis and track association with a network of proximity sensors
Target motion analysis and track association are the aims of this paper. It is assumed that the target trajectory is only partially observable by using temporal processing of a si...
Régis Donati, Jean-Pierre Le Cadre
JEC
2006
73views more  JEC 2006»
13 years 10 months ago
Frame packing algorithms for automotive applications
The set of frames exchanged in automotive applications must meet two constraints: it has to be feasible from a schedulability point of view and it should minimize the network bandw...
Rishi Saket, Nicolas Navet
SCL
2008
113views more  SCL 2008»
13 years 10 months ago
Modular design of nonlinear observers for state and disturbance estimation
This work studies the problem of design of nonlinear observers in the presence of exogenous disturbances. In particular, the present work proposes a systematic design method for no...
Costas Kravaris, Georgios Savoglidis
RV
2010
Springer
133views Hardware» more  RV 2010»
13 years 8 months ago
Compensation-Aware Runtime Monitoring
To avoid large overheads induced by runtime monitoring, the use of asynchronous log-based monitoring is sometimes adopted — even though this implies that the system may proceed f...
Christian Colombo, Gordon J. Pace, Patrick Abela