Sciweavers

87 search results - page 12 / 18
» Modeling System Security Rules with Time Constraints Using T...
Sort
View
FLAIRS
2000
13 years 8 months ago
Autonomous Automobile Behavior through Context-Based Reasoning
Today's driving simulators are used in vehicle research and design as well as in training. However, most simulators are not convincing because the degree of realism is not ad...
Fernando G. Gonzalez, Patrick Grejs, Avelino J. Go...
MSO
2003
13 years 8 months ago
Control System Design of the CERN/CMS Tracker Thermal Screen
The Tracker is one of the CMS (Compact Muon Solenoid experiment) detectors to be installed at the LHC (Large Hadron Collider) accelerator, scheduled to start data taking in 2007. ...
Enzo Carrone, Andromachi Tsirou
CCS
2001
ACM
14 years 13 hour ago
Practical forward secure group signature schemes
A group signature scheme allows a group member to sign messages anonymously on behalf of the group, while in case of a dispute, a designated entity can reveal the identity of a si...
Dawn Xiaodong Song
ISLPED
2010
ACM
158views Hardware» more  ISLPED 2010»
13 years 7 months ago
Temperature- and energy-constrained scheduling in multitasking systems: a model checking approach
The ongoing scaling of semiconductor technology is causing severe increase of on-chip power density and temperature in microprocessors. This has raised urgent requirement for both...
Weixun Wang, Xiaoke Qin, Prabhat Mishra
TOOLS
2000
IEEE
13 years 12 months ago
More Meaningful UML Models
UML is widely used today for modelling complex systems. However, the tools support capabilities for UML is limited, partially due to its lack of precise semantics. There are some ...
Ileana Ober