Sciweavers

1407 search results - page 174 / 282
» Using Use Cases in Executable Z
Sort
View
ICRA
2008
IEEE
185views Robotics» more  ICRA 2008»
15 years 10 months ago
Humanoid teleoperation for whole body manipulation
— We present results of successful telemanipulation of large, heavy objects by a humanoid robot. Using a single joystick the operator controls walking and whole body manipulation...
Mike Stilman, Koichi Nishiwaki, Satoshi Kagami
FUZZIEEE
2007
IEEE
15 years 10 months ago
Applying Fuzzy Logic for Decision-making on Wireless Sensor Networks
— We propose a fuzzy-based decision-making mechanism for selecting data dissemination protocols in wireless sensor networks (WSNs). Its goal is to select the most efficient proto...
Luci Pirmez, Flávia Coimbra Delicato, Paulo...
SCAM
2007
IEEE
15 years 10 months ago
Barrier Slicing for Remote Software Trusting
Remote trusting aims at verifying the “healthy” execution of a program running on an untrusted client that communicates with a trusted server via network connection. After giv...
Mariano Ceccato, Mila Dalla Preda, Jasvir Nagra, C...
DEXAW
2006
IEEE
151views Database» more  DEXAW 2006»
15 years 10 months ago
Avenues to Flexible Data Integrity Checking
Traditional methods for integrity checking in relational or deductive databases heavily rely on the assumption that data have integrity before the execution of updates. In this wa...
Hendrik Decker, Davide Martinenghi
FDL
2006
IEEE
15 years 10 months ago
Reusing Real-Time Systems Design Experience
To ensure correctness and performance of real-time embedded systems, early evaluation of properties is needed. Based on design experience for real-time systems and using the conce...
Oana Florescu, Jeroen Voeten, Marcel Verhoef, Henk...