Sciweavers

3066 search results - page 394 / 614
» On Facilitating Automated Evaluation
Sort
View
HICSS
2007
IEEE
108views Biometrics» more  HICSS 2007»
14 years 2 months ago
Addressing IT Security for Critical Control Systems
— Control systems for critical infrastructures like national power grids make increasingly use of open technologies and protocols, and the Internet. In this environment, the risk...
Martin Naedele
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
14 years 2 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
IROS
2007
IEEE
157views Robotics» more  IROS 2007»
14 years 2 months ago
Coordination of multiple vehicles for area coverage tasks
— Area coverage operations such as plowing a field or mowing a lawn can be performed faster if multiple vehicles are involved. To use a team of automated vehicles safely and eff...
Garrett Dean Winward, Nicholas S. Flann
SIES
2007
IEEE
14 years 2 months ago
Design Space Exploration with Evolutionary Multi-Objective Optimisation
— High level synthesis is one of the next major steps to improve the hw/sw co-design process. The advantages of high nthesis are two-fold. At first the level of abstraction is r...
Martin Holzer 0002, Bastian Knerr, Markus Rupp
CCIA
2007
Springer
14 years 2 months ago
Semantic disambiguation of taxonomies
Polysemy is one of the most difficult problems when dealing with natural language resources. Consequently, automated ontology learning from textual sources (such as web resources) ...
David Sánchez, Antonio Moreno