Sciweavers

271 search results - page 34 / 55
» From Trust to Dependability through Risk Analysis
Sort
View
NETWORKING
2000
13 years 9 months ago
Survivability Analysis of Ad Hoc Wireless Network Architecture
Mobile ad hoc wireless networks are generating novel interests in mobile computing. The dynamism in network topology has thrown up multifarious issues, requiring a fresh look into ...
Krishna Paul, Romit Roy Choudhury, Somprakash Band...
ISPW
2006
IEEE
14 years 1 months ago
A Value-Based Software Process Framework
This paper presents a value-based software process framework that has been derived from the 4+1 theory of value-based software engineering (VBSE). The value-based process framework...
Barry W. Boehm, Apurva Jain
ICRA
2002
IEEE
120views Robotics» more  ICRA 2002»
14 years 22 days ago
Dynamic Dexterity for the Performance of "Wall-Bouncing" Tasks
In this paper, we consider ”wall-bouncing” task in which we repeat the process of hitting the ball that rebounds from the wall and the table as a typical example of dexterous ...
Masahiro Takeuchi, Fumio Miyazaki, Michiya Matsush...
COMPSAC
2007
IEEE
13 years 11 months ago
Infrastructure Hardening: A Competitive Coevolutionary Methodology Inspired by Neo-Darwinian Arms Races
The world is increasingly dependent on critical infrastructures such as the electric power grid, water, gas, and oil transport systems, which are susceptible to cascading failures...
Travis C. Service, Daniel R. Tauritz, William M. S...
GLOBECOM
2008
IEEE
14 years 2 months ago
MILSA: A Mobility and Multihoming Supporting Identifier Locator Split Architecture for Naming in the Next Generation Internet
— Naming and addressing are important issues for Next Generation Internet (NGI). In this paper, we discuss a new Mobility and Multihoming supporting Identifier Locator Split Arch...
Jianli Pan, Subharthi Paul, Raj Jain, Mic Bowman