Sciweavers

248 search results - page 41 / 50
» Test exploration and validation using transaction level mode...
Sort
View
ALIFE
2000
13 years 8 months ago
Pattern Formation and Optimization in Army Ant Raids
Army ant colonies display complex foraging raid patterns involving thousands of individuals communicating through chemical trails. In this article we explore, by means of a simple ...
Ricard V. Solé, Eric Bonabeau, Jordi Delgad...
ICRA
2005
IEEE
113views Robotics» more  ICRA 2005»
14 years 2 months ago
Symmetric Walking Control: Invariance and Global Stability
— This paper first presents a novel control strategy for periodic motion control based on a Hamiltonian system. According to the strategy, hybrid symmetric orbits (ideal walking...
Sang-Ho Hyon, Takashi Emura
KDD
2012
ACM
205views Data Mining» more  KDD 2012»
11 years 11 months ago
Intrusion as (anti)social communication: characterization and detection
A reasonable definition of intrusion is: entering a community to which one does not belong. This suggests that in a network, intrusion attempts may be detected by looking for com...
Qi Ding, Natallia Katenka, Paul Barford, Eric D. K...
JSS
2002
90views more  JSS 2002»
13 years 8 months ago
Producing reliable software: an experiment
A customer of high assurance software recently sponsored a software engineering experiment in which a small real-time software system was developed concurrently by two popular sof...
Carol Smidts, Xin Huang, James C. Widmaier
IPPS
2007
IEEE
14 years 2 months ago
Packet Reordering in Network Processors
Network processors today consists of multiple parallel processors (microengines) with support for multiple threads to exploit packet level parallelism inherent in network workload...
S. Govind, R. Govindarajan, Joy Kuri