Sciweavers

2838 search results - page 487 / 568
» Verifying Controlled Components
Sort
View
ACSAC
2000
IEEE
14 years 1 months ago
Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness
In this paper we describe a new class of tools for protecting computer systems from security attacks. Their distinguished feature is the principle they are based on. Host or netwo...
Danilo Bruschi, Lorenzo Cavallaro, Emilia Rosti
ICPR
2000
IEEE
14 years 1 months ago
Database Architecture for Autonomous Transportation Agents for On-Scene Networked Incident Management (ATON)
A collection of distributed databases forms an important architectural component of the ATON project for networked incidence management of highway traffic. The database sub-archit...
Mohan M. Trivedi, Shailendra K. Bhonsle, Amarnath ...
ICSM
2000
IEEE
14 years 1 months ago
A Deployment System for Pervasive Computing
Software has for a long time been used for controlling different systems. Today, there is a trend towards integrating software into consumer electronics, home appliances, cars etc...
Jesper Andersson
ISORC
2000
IEEE
14 years 1 months ago
Hybrid Sequence Charts
We introduce Hybrid Sequence Charts (HySCs) as a visual description technique for communication in hybrid system models. To that end, we adapt a subset of the well-known MSC synta...
Radu Grosu, Ingolf Krüger, Thomas Stauner
SIGGRAPH
2000
ACM
14 years 1 months ago
A fast relighting engine for interactive cinematic lighting design
We present new techniques for interactive cinematic lighting design of complex scenes that use procedural shaders. Deep-framebuffers are used to store the geometric and optical in...
Reid Gershbein, Pat Hanrahan