Sciweavers

3318 search results - page 155 / 664
» The Weak Instance Model
Sort
View
ISTA
2004
13 years 9 months ago
TransM: A Structured Document Transformation Model
: We present in this paper a transformation model for structured documents. TransM is a new model that deals with specified documents, where the structure conforms to a predefined ...
Nouhad Amaneddine, Jean Paul Bahsoun, Jean-Paul Bo...
KBSE
2008
IEEE
14 years 2 months ago
Unit Testing of Flash Memory Device Driver through a SAT-Based Model Checker
Flash memory has become virtually indispensable in most mobile devices. In order for mobile devices to successfully provide services to users, it is essential that flash memory b...
Moonzoo Kim, Yunho Kim, Hotae Kim
IROS
2007
IEEE
162views Robotics» more  IROS 2007»
14 years 2 months ago
Genetic MRF model optimization for real-time victim detection in search and rescue
— One primary goal in rescue robotics is to deploy a team of robots for coordinated victim search after a disaster. This requires robots to perform subtasks, such as victim detec...
Alexander Kleiner, Rainer Kümmerle
WISA
2007
Springer
14 years 2 months ago
A Compositional Multiple Policies Operating System Security Model
Multilevel security policies aim at only confidentiality assurance, with less consideration on integrity assurance and weakness in expressing channel control policies. Besides, the...
Lei Xia, Wei Huang, Hao Huang
TOOLS
1999
IEEE
14 years 14 days ago
Two-Level Modeling
Experience on a large banking application has highlighted expressive weaknesses in the standard (concrete) syntax of UML, resulting in models that are under-constrained. It es, ho...
Anthony Lauder, Stuart Kent