Sciweavers

SAC
2010
ACM
14 years 7 months ago
MSP algorithm: multi-robot patrolling based on territory allocation using balanced graph partitioning
This article addresses the problem of efficient multi-robot patrolling in a known environment. The proposed approach assigns regions to each mobile agent. Every region is represen...
David Portugal, Rui Rocha
SAC
2010
ACM
14 years 7 months ago
A real-time architecture design language for multi-rate embedded control systems
This paper presents a language dedicated to the description of the software architecture of complex embedded control systems. The language relies on the synchronous approach but e...
Julien Forget, Frédéric Boniol, Davi...
SAC
2010
ACM
14 years 7 months ago
Applying taxonomic knowledge to Bayesian belief network for personalized search
Keyword-based search returns its results without concern for the information needs of users at a particular time. In general, search queries are too short to represent what users ...
Jae-won Lee, Han-joon Kim, Sang-goo Lee
SAC
2010
ACM
14 years 7 months ago
Agent-based coordination for the sensor web
Conor Muldoon, Richard Tynan, Gregory M. P. O'Hare...
SAC
2010
ACM
14 years 7 months ago
Reachability analysis of GSPDIs: theory, optimization, and implementation
Analysis of systems containing both discrete and continuous dynamics, hybrid systems, is a difficult issue. Most problems have been shown to be undecidable in general, and decidab...
Hallstein Asheim Hansen, Gerardo Schneider
SAC
2010
ACM
14 years 7 months ago
ESB federation for large-scale SOA
Embracing service-oriented architectures in the context of large systems, such as the Web, rises a set of new and challenging issues: increased size and load in terms of users and...
Françoise Baude, Imen Filali, Fabrice Huet,...
SAC
2010
ACM
14 years 7 months ago
TokDoc: a self-healing web application firewall
The growing amount of web-based attacks poses a severe threat to the security of web applications. Signature-based detection techniques increasingly fail to cope with the variety ...
Tammo Krueger, Christian Gehl, Konrad Rieck, Pavel...
SAC
2010
ACM
14 years 7 months ago
A simple role mining algorithm
Complex organizations need to establish access control policies in order to manage access to restricted resources. Role Based Access Control paradigm has been introduced in ’90 ...
Carlo Blundo, Stelvio Cimato
SAC
2010
ACM
14 years 7 months ago
Implementing software product lines using traits
A software product line (SPL) is a set of software systems with well-defined commonalities and variabilities that are developed by managed reuse of common artifacts. In this pape...
Lorenzo Bettini, Ferruccio Damiani, Ina Schaefer
SAC
2010
ACM
14 years 7 months ago
A generative pattern model for mining binary datasets
In many application fields, huge binary datasets modeling real life-phenomena are daily produced. The dataset records are usually associated with observations of some events, and...
Claudio Lucchese, Salvatore Orlando, Raffaele Pere...