نتایج جستجو برای: layered

تعداد نتایج: 33794  

Journal: :Acta Cybern. 2016
Geir Agnarsson Raymond Greenlaw Sanpawat Kantabutra

In this paper we consider the structure and topology of a layered-security model in which the containers and their nestings are given in the form of a rooted tree T . A cyber-security model is an ordered three-tuple M = (T,C, P ) where C and P are multisets of penetration costs for the containers and targetacquisition values for the prizes that are located within the containers, respectively, b...

2002
Tak-John Koo S. Shankar Sastry

Abstract. In this paper, a hierarchical system architecture for singleagent multi-modal systems is proposed. The layered system is designed to promote proof obligations so that system specification at one level of granularity conforms with that at another level and vice versa. The design principle for the construction of the hierarchy is based on bisimulation with respect to reachability specif...

Journal: :CoRR 2017
Eric Kingery Michael S. Manley Daniel Ratner

Public Good Software’s products match journalistic articles and other narrative content to relevant charitable causes and nonprofit organizations so that readers can take action on the issues raised by the articles’ publishers. Previously an expensive and laborintensive process, application of machine learning and other automated textual analyses now allow us to scale this matching process to t...

2009
Allaa Kamil Gavin Lowe

We adapt the Strand Spaces model to reason abstractly about layered security protocols, where an Application Layer protocol is layered on top of a secure transport protocol. The model abstracts away from the implementation of the secure transport protocol and just captures the properties that it provides to the Application Layer. We illustrate the usefulness of the model by using it to verify a...

2010
Janos Sztipanovits Csaba Biegl Gabor Karsai

The paper discusses a comprehensive, model-based approach for the design and implementation of intelligent controllers. The system has been implemented in the framework of the Multigraph Architecture. The Multigraph Architecture is a layered system, which includes a parallel, graph computation model, the corresponding execution environment, and software tools supporting the interactive, graphic...

Journal: :CoRR 2013
Mohammad Shahrokh Esfahani Masoumeh Nasiri-Kenari

A multiple access relay channel (MARC) is considered in which an analogue-like network coding is implemented in the relay node. This analogue coding is a simple addition of the received signals at the relay node. Using “nulling detection” structure employed in V-BLAST receiver, we propose a detection scheme in the destination which is able to provide a diversity order of two for all users. We a...

1998
J. Cooperstock

A robust layered control system for a mobile robot. Brooks, R. 1985. [1] A layered architecture for office delivery robots. Simmons, R. 1997. [2]

2009
K. Sarabandi

Layered dielectric media is encountered in many electromagnetic problems such as analysis of multi-layered substrate/superstrate microwave circuits and printed antennas as well as modeling the terrain with a dielectric stratified medium. In this section a procedure for evaluating the dyadic Green’s function for a multi-layered (with planar interfaces) medium with arbitrary positions of the sour...

پیغمبری, سیما ,

Mafic and ultramafic layered rocks located in south of Orzuieh (Baft, Kerman province), consist of plagioclase bearing ultramafic rocks (including olivine, orthopyroxene , clinopyroxene and plagioclase), olivine gabbros (including plagioclase, olivine, orthopyroxene and clinopyroxene) and gabbronorites (including plagioclase, orthopyroxene and clinopyroxene and amphibole) and constitute the maf...

Journal: :Computers & Security 2006
Nikos Komninos Dimitris Vergados Christos Douligeris

When security of a given network architecture is not properly designed from the beginning, it is difficult to preserve confidentiality, authenticity, integrity and nonrepudiation in practical networks. Unlike traditional mobile wireless networks, ad hoc networks rely on individual nodes to keep all the necessary interconnections alive. In this article we investigate the principal security issue...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید