Sciweavers

423 search results - page 62 / 85
» Formal access control analysis in the software development p...
Sort
View
IAT
2006
IEEE
14 years 2 months ago
Specification and Verification of Dynamics in Cognitive Agent Models
Within many domains, among which biological and cognitive areas, multiple interacting processes occur among agents with dynamics that are hard to handle. Current approaches to ana...
Tibor Bosse, Catholijn M. Jonker, Lourens van der ...
ICST
2009
IEEE
14 years 3 months ago
An Initial Characterization of Industrial Graphical User Interface Systems
To date we have developed and applied numerous model-based GUI testing techniques; however, we are unable to provide definitive improvement schemes to real-world GUI test planners...
Penelope A. Brooks, Brian P. Robinson, Atif M. Mem...
ICST
2008
IEEE
14 years 3 months ago
Pre-testing Flash Device Driver through Model Checking Techniques
Flash memory has become virtually indispensable in most mobile devices, such as mobile phones, digital cameras, mp3 players, etc. In order for mobile devices to successfully provi...
Moonzoo Kim, Yunja Choi, Yunho Kim, Hotae Kim
JDCTA
2010
172views more  JDCTA 2010»
13 years 3 months ago
Characterizing MEGACO Security in the presence Diameter Server
This paper analyzes performance of MEGACO (Media Gateway Control Protocol) based on Diameter which is an Authentication, Authorization,andAccounting (AAA) protocol developed withi...
Pedram Hajipour, Kolsoom Abbasi Shahkooh
ETFA
2005
IEEE
14 years 2 months ago
A multi-robot system for landmine detection
This paper describes the development of a multi-robot system for Area Reduction in Humanitarian Demining. In spite of the specific requirements imposed to the work being carried ...
Pedro Santana, José Barata, H. Cruz, A. Mes...