Sciweavers

2068 search results - page 403 / 414
» Networked and quantized control systems with communication d...
Sort
View
IFIP
1994
Springer
13 years 11 months ago
E-mail as an Enabling Technology in Brazil: The CNPq/ProTeM-CC Experience
Development of a research project in Computer Science, integrating a considerable number of research institutions and about 1200 individual researchers all over a country with big...
José Palazzo M. de Oliveira, Norberto Hoppe...
FM
2006
Springer
133views Formal Methods» more  FM 2006»
13 years 11 months ago
Enforcer - Efficient Failure Injection
Non-determinism of the thread schedule is a well-known problem in concurrent programming. However, other sources of non-determinism exist which cannot be controlled by an applicati...
Cyrille Artho, Armin Biere, Shinichi Honiden
JFR
2007
131views more  JFR 2007»
13 years 7 months ago
Adaptive teams of autonomous aerial and ground robots for situational awareness
In this paper, we report on the integration challenges of the various component technologies developed towards the establishment of a framework for deploying an adaptive system of...
M. Ani Hsieh, Anthony Cowley, James F. Keller, Lui...
SIAMCO
2010
147views more  SIAMCO 2010»
13 years 5 months ago
Anytime Reliable Transmission of Real-Valued Information through Digital Noisy Channels
Abstract. The problem of reliably transmitting a real-valued random vector through a digital noisy channel is relevant for the design of distributed estimation and control techniqu...
Giacomo Como, Fabio Fagnani, Sandro Zampieri
EUROSYS
2008
ACM
14 years 4 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos