Sciweavers

2043 search results - page 334 / 409
» Reasoning About Security Models
Sort
View
SIGIR
2010
ACM
14 years 1 months ago
Understanding web browsing behaviors through Weibull analysis of dwell time
Dwell time on Web pages has been extensively used for various information retrieval tasks. However, some basic yet important questions have not been sufficiently addressed, e.g., ...
Chao Liu, Ryen W. White, Susan T. Dumais
ICCAD
2007
IEEE
165views Hardware» more  ICCAD 2007»
14 years 1 months ago
Automated refinement checking of concurrent systems
Stepwise refinement is at the core of many approaches to synthesis and optimization of hardware and software systems. For instance, it can be used to build a synthesis approach for...
Sudipta Kundu, Sorin Lerner, Rajesh Gupta
ATAL
2006
Springer
14 years 1 months ago
A constraint optimization framework for fractured robot teams
In dangerous and uncertain environments initial plans must be revised. Communication failures hamper this replanning. We introduce fractured subteams as a novel formalism for mode...
Mary Koes, Katia P. Sycara, Illah R. Nourbakhsh
EDOC
2004
IEEE
14 years 1 months ago
Formalizing ODP Computational Viewpoint Specifications in Maude
The ODP computational viewpoint describes the functionality of a system and its environment, in terms of a configuration of objects which interact at interfaces. Computational obj...
José Raúl Romero, Antonio Vallecillo
EUROMICRO
2004
IEEE
14 years 1 months ago
Towards Predicting Real-Time Properties of a Component Assembly
This paper addresses the prediction of timing properties of a component-based application already during the composition phase. At this stage, it is of vital importance to guarant...
Egor Bondarev, Peter H. N. de With, Michel R. V. C...