Sciweavers

641 search results - page 6 / 129
» Identifying Contingency Requirements Using Obstacle Analysis
Sort
View
TROB
2002
138views more  TROB 2002»
13 years 7 months ago
Interference-free polyhedral configurations for stacking
This paper uses a configuration space ( -space) based method to compute interference-free configuration for stacking polyhedral sheet metal parts. This work forms the interference ...
Venkateswara R. Ayyadevara, David A. Bourne, Kenji...
DGO
2008
99views Education» more  DGO 2008»
13 years 9 months ago
Specifying and verifying requirements for election processes
In this paper we outline an approach for modeling election processes and then performing rigorous analysis to verify that these process models meet selected behavioral requirement...
Borislava I. Simidchieva, Matthew Marzilli, Lori A...
CARDIS
2008
Springer
119views Hardware» more  CARDIS 2008»
13 years 9 months ago
Static Program Analysis for Java Card Applets
The Java Card API provides a framework of classes and interfaces that hides the details of the underlying smart card interface, thus relieving developers from going through the swa...
Vasilios Almaliotis, Alexandros Loizidis, Panagiot...
IROS
2007
IEEE
150views Robotics» more  IROS 2007»
14 years 1 months ago
Long-Term learning using multiple models for outdoor autonomous robot navigation
Abstract—Autonomous robot navigation in unstructured outdoor environments is a challenging area of active research. The navigation task requires identifying safe, traversable pat...
Michael J. Procopio, Jane Mulligan, Gregory Z. Gru...
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
13 years 11 months ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...