Sciweavers

4250 search results - page 763 / 850
» Understanding the Requirements on Modelling Techniques
Sort
View
DSN
2009
IEEE
13 years 6 months ago
RRE: A game-theoretic intrusion Response and Recovery Engine
Preserving the availability and integrity of networked computing systems in the face of fast-spreading intrusions requires advances not only in detection algorithms, but also in a...
Saman A. Zonouz, Himanshu Khurana, William H. Sand...
IJRR
2011
98views more  IJRR 2011»
13 years 4 months ago
Real-time photorealistic virtualized reality interface for remote mobile robot control
The task of teleoperating a robot over a wireless video link is known to be very difficult. Teleoperation becomes even more difficult when the robot is surrounded by dense obstac...
Alonzo Kelly, Nicholas Chan, Herman Herman, Daniel...
NFM
2011
252views Formal Methods» more  NFM 2011»
13 years 4 months ago
Call Invariants
Program verifiers based on first-order theorem provers model the program heap as a collection of mutable maps. In such verifiers, preserving unmodified facts about the heap acr...
Shuvendu K. Lahiri, Shaz Qadeer
STTT
2011
161views more  STTT 2011»
13 years 4 months ago
Automating regression testing using web-based application similarities
Web-based applications are one of the most widely used types of software, and have become the backbone of many e-commerce and communications businesses. These applications are ofte...
Kinga Dobolyi, Elizabeth Soechting, Westley Weimer
INFOCOM
2011
IEEE
13 years 14 days ago
A dynamic relay selection scheme for mobile users in wireless relay networks
—Cooperative communication has attracted dramatic attention in the last few years due to its advantage in mitigating channel fading. Despite much effort that has been made in the...
Yifan Li, Ping Wang, Dusit Niyato, Weihua Zhuang