Sciweavers

714 search results - page 131 / 143
» Verification and Compliance Testing
Sort
View
JIRS
2007
229views more  JIRS 2007»
13 years 8 months ago
Unmanned Vehicle Controller Design, Evaluation and Implementation: From MATLAB to Printed Circuit Board
A detailed step-by-step approach is presented to optimize, standardize, and automate the process of unmanned vehicle controller design, evaluation, validation and verification, fol...
Daniel Ernst, Kimon P. Valavanis, Richard Garcia, ...
ENTCS
2002
107views more  ENTCS 2002»
13 years 8 months ago
Monitoring, Checking, and Steering of Real-Time Systems
The MaC system has been developed to provide assurance that a target program is running correctly with respect to formal requirements specification. This is achieved by monitoring...
Moonjoo Kim, Insup Lee, Usa Sammapun, Jangwoo Shin...
PR
2002
202views more  PR 2002»
13 years 8 months ago
Illumination color covariant locale-based visual object retrieval
Search by Object Model -- finding an object inside a target image -- is a desirable and yet difficult mechanism for querying multimedia data. An added difficulty is that objects c...
Mark S. Drew, Ze-Nian Li, Zinovi Tauber
TSE
1998
131views more  TSE 1998»
13 years 8 months ago
Experiences Using Lightweight Formal Methods for Requirements Modeling
—This paper describes three case studies in the lightweight application of formal methods to requirements modeling for spacecraft fault protection systems. The case studies diffe...
Steve M. Easterbrook, Robyn R. Lutz, Richard Covin...
CORR
2010
Springer
225views Education» more  CORR 2010»
13 years 8 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...