This paper presents the ARTS (Agent-oriented Robust Transactional System) model, which applies transaction concepts to provide agent developers with high-level support for agent system robustness and reliability. ARTS...
详细信息
Context. Development of safety-critical systems is mostly governed by process-heavy paradigms, while increasing demands on flexibility and agility also reach this domain. Objectives. We wanted to explore in more detai...
详细信息
We introduce a constraint-based framework for strictness analysis applicable to ML style languages supporting higher-order functions, let-style polymorphism and algebraic data types. The analysis produces strictness t...
详细信息
In this paper, we propose a novel feature extraction method based on local quinary patterns (LQP), multifractal features and intensity histograms for classifying emphysema into three subtypes in computed tomography im...
详细信息
Simulation is used for developing and testing different scenarios under controlled and reproducible situations. Proper handling of the initial transient effect for steady state simulations, proper selection of simulat...
详细信息
WPANs (Wireless Personal Area Networks) fill an important role in local area network technology complementing traditional IEEE 802.11 Wireless LANs. Bluetooth, ZigBee and NFC (Near Field Communications) have emerged a...
详细信息
ISBN:
(纸本)9781605580890
WPANs (Wireless Personal Area Networks) fill an important role in local area network technology complementing traditional IEEE 802.11 Wireless LANs. Bluetooth, ZigBee and NFC (Near Field Communications) have emerged as the key WPAN technologies. They are however subject to the usual range of security vulnerabilities found in wireless LANs such as spoofing, snooping, man-in-the-middle, denial of service and other attacks. However security in WPANs is not as mature as it is in Wireless LANs and further work is needed in order to provide comparable protection. This paper examines a range of vulnerabilities and security attacks that can be performed on Bluetooth, ZigBee and NFC WPANs and proposes protection mechanisms that can mitigate such risks.
Language identification is the task of identifying the language a given document is written in. This paper describes a detailed examination of what models perform best under different conditions, based on experiments ...
详细信息
This paper proposes a fluid rendering pipeline that uses OpenGL-4 shaders to employ the parallel processing capabilities of the GPU. The fluid's surface mesh is produced using tessellation shader stages where the ...
详细信息
Network security can be analysed using attack representation models (ARMs) (e.g., Attack Graphs (AGs) and Attack Trees (ATs)). One can analyse the network security by computing all possible attack scenarios, but it su...
详细信息
We present a reasoning procedure for ontologies with uncertainty described in Description Logic (DL) which include General TBoxes, i.e., include cycles and General Concept Inclusions (GCIs). For this, we consider the ...
详细信息
暂无评论