Sciweavers

2763 search results - page 51 / 553
» The Dangerous 'All' in Specifications
Sort
View
JFR
2007
150views more  JFR 2007»
13 years 9 months ago
Decisional autonomy of planetary rovers
To achieve the ever increasing demand for science return, planetary exploration rovers require more autonomy to successfully perform their missions. Indeed, the communication dela...
Félix Ingrand, Simon Lacroix, Solange Lemai...
PRL
2007
287views more  PRL 2007»
13 years 8 months ago
2D and 3D face recognition: A survey
Government agencies are investing a considerable amount of resources into improving security systems as result of recent terrorist events that dangerously exposed flaws and weakn...
Andrea F. Abate, Michele Nappi, Daniel Riccio, Gab...
ISSTA
2012
ACM
11 years 11 months ago
ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies
Since web applications are easily accessible, and often store a large amount of sensitive user information, they are a common target for attackers. In particular, attacks that foc...
Muath Alkhalaf, Shauvik Roy Choudhary, Mattia Fazz...
FOMI
2009
13 years 7 months ago
A First-Order Cutting Process Ontology for Sheet Metal Parts
The semantic integration of manufacturing systems has been impeded by the lack of rigorous ontologies for specific domains of manufacturing processes and resources. In this paper w...
Michael Grüninger, Arnaud Delaval
UML
1998
Springer
14 years 1 months ago
Automating the Synthesis of UML StateChart Diagrams from Multiple Collaboration Diagrams
The use of scenarios has become a popular technique for requirements elicitation and specification building. Since scenarios capture only partial descriptions of system behavior, ...
Ismaïl Khriss, Mohammed Elkoutbi, Rudolf K. K...