Sciweavers

984 search results - page 130 / 197
» ideas 2006
Sort
View
QSIC
2006
IEEE
14 years 4 months ago
PORTAM: Policy, Requirements and Threats Analyzer for Mobile Code Application
Users and providers of an information system should clearly understand the threats caused by the system as well as clarify the requirements for the system before they use the syst...
Haruhiko Kaiya, Kouta Sasaki, Kenji Kaijiri
ROBIO
2006
IEEE
156views Robotics» more  ROBIO 2006»
14 years 4 months ago
Abstraction of Odor Source Declaration Algorithm from Moth-Inspired Plume Tracing Strategies
—A moth behavior-inspired strategy, including tracing a chemical plume to its source and declaring the source location, was tested in near shore ocean conditions via a REMUS unde...
Wei Li
SCAM
2006
IEEE
14 years 4 months ago
Cross-Language Program Analysis and Refactoring
Many software systems are mixed-language systems today, i.e., they bind together components defined in different programming and specification languages. Analyses and refactorin...
Dennis Strein, Hans Kratz, Welf Löwe
SEFM
2006
IEEE
14 years 4 months ago
Describing and Executing Random Reactive Systems
We present an operational model for describing random reactive systems. Some models have already been proposed for this purpose, but they generally aim at performing global reason...
Pascal Raymond, Erwan Jahier, Yvan Roux
SKG
2006
IEEE
14 years 4 months ago
Remote Memory Management and Prefetching Techniques for Jobs in Grid
Predominant resources for execution of any application are computational power and memory. On one side, computational power has grown many folds faster than memory capacity. On th...
S. Radha, S. Mary Saira Bhanu, N. P. Gopalan