Sciweavers

2838 search results - page 437 / 568
» Verifying Controlled Components
Sort
View
SAB
2004
Springer
198views Optimization» more  SAB 2004»
14 years 3 months ago
A Review of Probabilistic Macroscopic Models for Swarm Robotic Systems
Abstract. In this paper, we review methods used for macroscopic modeling and analyzing collective behavior of swarm robotic systems. Although the behavior of an individual robot in...
Kristina Lerman, Alcherio Martinoli, Aram Galstyan
DBSEC
2003
155views Database» more  DBSEC 2003»
13 years 11 months ago
Schema Based XML Security: RBAC Approach
As a platform-independent solution, XML is going to be used in many environments such as application integration and Web Services. Security of XML instance is a basic problem, esp...
Xinwen Zhang, Jaehong Park, Ravi S. Sandhu
CDC
2010
IEEE
203views Control Systems» more  CDC 2010»
13 years 4 months ago
Cyber security analysis of state estimators in electric power systems
In this paper, we analyze the cyber security of state estimators in Supervisory Control and Data Acquisition (SCADA) systems operating in power grids. Safe and reliable operation o...
André Teixeira, Saurabh Amin, Henrik Sandbe...
CVPR
2006
IEEE
15 years 10 days ago
Escaping local minima through hierarchical model selection: Automatic object discovery, segmentation, and tracking in video
Recently, the generative modeling approach to video segmentation has been gaining popularity in the computer vision community. For example, the flexible sprites framework has been...
Nebojsa Jojic, John M. Winn, Larry Zitnick
ICSE
2005
IEEE-ACM
14 years 10 months ago
Use of relative code churn measures to predict system defect density
Software systems evolve over time due to changes in requirements, optimization of code, fixes for security and reliability bugs etc. Code churn, which measures the changes made to...
Nachiappan Nagappan, Thomas Ball