Timed Automata based provably correct robot control
暂无分享,去创建一个
[1] R. Alur,et al. Modelchecking for real-time systems , 1990 .
[2] Wang Yi,et al. Uppaal in a nutshell , 1997, International Journal on Software Tools for Technology Transfer.
[3] F. Garcia,et al. Bulk Transfer Capacity Estimation in IPv6 Networks , 2006, 2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06).
[4] Kim G. Larsen,et al. A Tutorial on Uppaal , 2004, SFM.
[5] Stavros Tripakis,et al. Interesting Properties of the Real-Time Conformance Relation , 2006, ICTAC.
[6] Jonathan J. Oliver,et al. Anatomy of a Phishing Email , 2004, CEAS.
[7] Ken Masamune,et al. Scrub nurse robot system-intraoperative motion analysis of a scrub nurse and timed-automata-based model for surgery , 2005, IEEE Transactions on Industrial Electronics.
[8] J. Vain,et al. Human-robot interaction learning using timed automata , 2009, 2009 ICCAS-SICE.
[9] Ali Al-Qayedi,et al. Combined Web/mobile authentication for secure Web access control , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).
[10] Simson L. Garfinkel,et al. Secure Web Authentication with Mobile Phones , 2004 .
[11] Jüri Vain,et al. Synthesis of test purpose directed reactive planning tester for nondeterministic systems , 2007, ASE.
[12] Kim G. Larsen,et al. Testing Real-Time Systems Using UPPAAL , 2008, Formal Methods and Testing.
[13] Thomas A. Henzinger,et al. Symbolic model checking for real-time systems , 1992, [1992] Proceedings of the Seventh Annual IEEE Symposium on Logic in Computer Science.
[14] Gianluigi Me,et al. A mobile based approach to strong authentication on Web , 2006, 2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06).
[15] Rajeev Alur,et al. Model-checking for real-time systems , 1990, [1990] Proceedings. Fifth Annual IEEE Symposium on Logic in Computer Science.
[16] Tyler Moore,et al. An Empirical Analysis of the Current State of Phishing Attack and Defence , 2007, WEIS.
[17] Lorrie Faith Cranor,et al. Phinding Phish: An Evaluation of Anti-Phishing Toolbars , 2007, NDSS.
[18] John C. Mitchell,et al. Client-Side Defense Against Web-Based Identity Theft , 2004, NDSS.
[19] J. Doug Tygar,et al. The battle against phishing: Dynamic Security Skins , 2005, SOUPS '05.