Sciweavers

1219 search results - page 211 / 244
» Verification of Equivalent-Results Methods
Sort
View
APSCC
2008
IEEE
13 years 12 months ago
Contract-Based Security Monitors for Service Oriented Software Architecture
Monitors have been used for real-time systems to ensure proper behavior; however, most approaches do not allow for the addition of relevant fields required to identify and react t...
Alexander M. Hoole, Issa Traoré
ATAL
2008
Springer
13 years 12 months ago
AGENTFLY: a multi-agent airspace test-bed
The contribution presents a multi-agent technology in the domain of the air-traffic control of several autonomous aerial vehicles (manned as well as unmanned). The system has been...
David Sislák, Premysl Volf, Stepán K...
BIOID
2008
183views Biometrics» more  BIOID 2008»
13 years 12 months ago
POLYBIO: Multimodal Biometric Data Acquisition Platform and Security System
Biometrics is the automated method of recognizing a person based on a physiological or behavioural characteristic. Biometric technologies are becoming the foundation of an extensiv...
Anastasis Kounoudes, Nicolas Tsapatsoulis, Zenonas...
CDC
2008
IEEE
119views Control Systems» more  CDC 2008»
13 years 12 months ago
Formal analysis of timed continuous Petri nets
In this paper, we develop an automated framework for formal verification of timed continuous Petri nets (contPN). Specifically, we consider two problems: (1) given an initial set o...
Marius Kloetzer, Cristian Mahulea, Calin Belta, La...
ACMACE
2005
ACM
13 years 12 months ago
Interactive and enjoyable interface in museum
Exhibitions at a scientific museum are usually difficult for ordinary school pupils. To improve the issues of current explanation systems, we use Personal Data Assistant (PDA) dev...
Fusako Kusunoki, Takako Yamaguti, Takuichi Nishimu...