Sciweavers

1221 search results - page 165 / 245
» On the Design of Robust Integrators for Fail-Bounded Control...
Sort
View
PLDI
2009
ACM
14 years 4 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni
HYBRID
2005
Springer
14 years 2 months ago
Interchange Formats for Hybrid Systems: Review and Proposal
Interchange formats have been the backbone of the EDA industry for several years. They are used as a way of helping the development of design flows that integrate foreign tools us...
Alessandro Pinto, Alberto L. Sangiovanni-Vincentel...
CONEXT
2008
ACM
13 years 11 months ago
A security plane for publish/subscribe based content oriented networks
The publish/subscribe communication paradigm is an appealing mechanism for efficient content retrieval due to the decoupling of data sources and consumers. However, the location d...
Walter Wong, Fábio Luciano Verdi, Maur&iacu...
BMCBI
2006
126views more  BMCBI 2006»
13 years 9 months ago
A joint model of regulatory and metabolic networks
Background: Gene regulation and metabolic reactions are two primary activities of life. Although many works have been dedicated to study each system, the coupling between them is ...
Chen-Hsiang Yeang, Martin Vingron
ETRA
2006
ACM
143views Biometrics» more  ETRA 2006»
14 years 3 months ago
openEyes: a low-cost head-mounted eye-tracking solution
Eye tracking has long held the promise of being a useful methodology for human computer interaction. However, a number of barriers have stood in the way of the integration of eye ...
Dongheng Li, Jason S. Babcock, Derrick Parkhurst