Sciweavers

1031 search results - page 123 / 207
» Modeling and Formal Verification of Production Automation Sy...
Sort
View
CCS
2008
ACM
13 years 9 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
VAMOS
2010
Springer
13 years 9 months ago
Conflict Resolution Strategies During Product Configuration
During product configuration, users are prone to make errors because of complexity and lack of system knowledge. Such errors cause conflicts (i.e., incompatible choices selected) a...
Alexander Nöhrer, Alexander Egyed
CDC
2010
IEEE
13 years 2 months ago
Tuning a synthetic in vitro oscillator using control-theoretic tools
Abstract-- This paper demonstrates the effectiveness of simple control-theoretic tools in generating simulation-guided experiments on a synthetic in vitro oscillator. A theoretical...
Christopher Sturk, Elisa Franco, Richard M. Murray
RML
2002
99views Business» more  RML 2002»
13 years 7 months ago
A System for Querying and Viewing Business Constraints
In E-commerce processes, various rules and constraints regarding product specifications, pricing, terms and conditions are exchanged between vendors and buyers. Developing a forma...
Mizuho Iwaihara, Masayuki Kozawa, Jun Narazaki, Ya...
ICTAI
1992
IEEE
13 years 11 months ago
Automated Parameter Tuning in Stereo Vision Under Time Constraints
This paper presents a method for tuning parameters under a fixed time constraint for a general binocular stereo-vision algorithm. A major difficulty in stereo vision, as well as i...
Steven R. Schwartz, Benjamin W. Wah