Sciweavers

1726 search results - page 290 / 346
» Traits: Tools and Methodology
Sort
View
WIKIS
2010
ACM
13 years 5 months ago
Toward sensitive information redaction in a collaborative, multilevel security environment
Wikis have proven to be an invaluable tool for collaboration. The most prominent is, of course, Wikipedia. Its open nature is not suitable for all environments; in corporate, gove...
Peter Gehres, Nathan Singleton, George Louthan, Jo...
ATAL
2009
Springer
13 years 5 months ago
Replicator Dynamics for Multi-agent Learning: An Orthogonal Approach
Today's society is largely connected and many real life applications lend themselves to be modeled as multi-agent systems. Although such systems as well as their models are d...
Michael Kaisers, Karl Tuyls
HCI
2009
13 years 5 months ago
YVision: A General Purpose Software Composition Framework
Abstract. Expectations for the industry of Human Computer Interaction are much higher today than they were ten or even five years ago. Innovative solutions to sense and gather info...
Antão Almada, Gonçalo Lopes, Andr&ea...
CDC
2010
IEEE
13 years 2 months ago
Trajectory generation using sum-of-norms regularization
Abstract-- Many tracking problems are split into two subproblems, first a smooth reference trajectory is generated that meet the control design objectives, and then a closed loop c...
Henrik Ohlsson, Fredrik Gustafsson, Lennart Ljung,...
SCN
2011
Springer
292views Communications» more  SCN 2011»
13 years 2 months ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...