Sciweavers

183 search results - page 14 / 37
» Safety analysis of usage control authorization models
Sort
View
ICRA
2007
IEEE
108views Robotics» more  ICRA 2007»
14 years 2 months ago
Locating a Circular Biochemical Source: Modeling and Control
— This paper applies the modified Fisher Information Matrix (FIM) motion algorithm previously proposed by the authors to the task of locating a circular biochemical source. We d...
Panos Tzanos, Milos Zefran
HYBRID
2010
Springer
14 years 1 months ago
Safe compositional network sketches: formal framework
NetSketch is a tool for the specification of constrained-flow applications and the certification of desirable safety properties imposed thereon. NetSketch assists system integr...
Azer Bestavros, Assaf J. Kfoury, Andrei Lapets, Mi...
ICONS
2008
IEEE
14 years 3 months ago
Analysis of Hybrid Systems Using HySAT
In this paper we describe the complete workflow of analyzing the dynamic behavior of safety-critical embedded systems with HySAT. HySAT is an arithmetic constraint solver with a ...
Christian Herde, Andreas Eggers, Martin Fränz...
DAGM
2007
Springer
14 years 2 months ago
Selection of Local Optical Flow Models by Means of Residual Analysis
Abstract. This contribution presents a novel approach to the challenging problem of model selection in motion estimation from sequences of images. New light is cast on parametric m...
Björn Andres, Fred A. Hamprecht, Christoph S....
IFIP
2009
Springer
13 years 6 months ago
Model Checking of Security-Sensitive Business Processes
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
Alessandro Armando, Serena Elisa Ponta