بحث بسيط
السجلات المعروضة 81 -- 90 من 103
A rewriting logic-based computation and deduction approach to avoid reactive system malfunctions
(
IEEE
, 2003 , Conference Paper)
Maude is, a powerful formal declarative programming language based on rewriting logic. Because of the reflective characteristic of the rewriting logic, Maude is considered by the scientific community as a universal model ...
A toolset for the specification and verification of embedded systems
(
IEEE
, 2003 , Conference Paper)
Because of many malfunctions of some critical real-time systems (Pentium bug, Ariane lance rocket), which have caused life and billion dollars loss, computer aided formal methods have been developed and successfully applied ...
Digital government service machine DGSM
(
IEEE
, 2008 , Conference Paper)
The rapid improvement in latest technologies motivates individuals to progress in their societies. Fast and worthy can be significant titles for the demands of this modern life. And because of technology improvements, there ...
Efficient forward error correction for reliable transmission in packet networks
(
dblp computer science bibliography
, 2008 , Conference Paper)
This paper proposes an approach that utilizes a new forward error correction mechanism for reconstructing lost or corrupted packets sent over a Network. Instead of retransmissions of lost or corrupted packets, the new ...
Performance evaluation of secured versus non-secured EIGRP routing protocol
(
dblp computer science bibliography
, 2008 , Conference Paper)
Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermediate node is considered. Due to the major ...
Selecting Web services with security compliances: A managerial perspective
(
dblp computer science bibliography
, 2007 , Conference Paper)
This paper proposes a framework of a decision support system (DSS) for the assessment process of selecting Web services with security compliances consistent with the enterprise business goal. The proposed DSS framework is ...
Security-oriented service composition and evolution
(
IEEE
, 2006 , Conference Paper)
This paper introduces a framework for security-oriented software service composition and evolution. Key building blocks of the framework are a semantic model for specifying the security objectives and properties at the ...
SecCom: A prototype for integrating security-aware components
(
Springer Verlag
, 2009 , Conference Paper)
This paper addresses information security from systems development point of view. This paper presents a prototype demonstrating how security-aware software components can be composed with other remote objects in terms of ...
Fuzzy time-frequency defect classifier for NDT applications
(
IEEE
, 2009 , Conference Paper)
In this paper, a customized classifier is presented for the industry-practiced Nondestructive Evaluation (NDE) protocols using a Hybrid-Fuzzy Inference System (FIS) to classify the and characterize the defects commonly ...
Intelligent sensor network for obstacle avoidance strategy
(
IEEE
, 2005 , Conference Paper)
An obstacle avoidance system was developed for a custom-made Autonomous Navigational Robotic Vehicle (ANROV), based on an intelligent sensor network and fuzzy logic control. Unlike conventional crisp control systems, this ...