Zobrazeno 1 - 10
of 600
pro vyhledávání: '"Morris, Eric"'
Autor:
Khan, Sakib Mahmud, Salek, M Sabbir, Harris, Vareva, Comert, Gurcan, Morris, Eric, Chowdhury, Mashrur
Publikováno v:
ACM J. Auton. Transport. Syst. (2023)
The traditional build-and-expand approach is not a viable solution to keep roadway traffic rolling safely, so technological solutions, such as Autonomous Vehicles (AVs), are favored. AVs have considerable potential to increase the carrying capacity o
Externí odkaz:
http://arxiv.org/abs/2307.01311
Autor:
Summerfield, Nicholas, Morris, Eric, Banerjee, Soumyanil, He, Qisheng, Ghanem, Ahmed I., Zhu, Simeng, Zhao, Jiwei, Dong, Ming, Glide-Hurst, Carri
Publikováno v:
In International Journal of Radiation Oncology, Biology, Physics 1 November 2024 120(3):904-914
Autor:
So, Suzanne H., Chau, Anson Kai Chun, Gaudiano, Brandon A., Ellett, Lyn, Lincoln, Tania M., Morris, Eric M.J., Kingston, Jessica L.
Publikováno v:
In Journal of Mood and Anxiety Disorders March 2024 5
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Gaudiano, Brandon A., Marks, Russell, Ellett, Lyn, So, Suzanne Ho-wai, Lincoln, Tania M., Morris, Eric M.J., Kingston, Jessica L.
Publikováno v:
In Journal of Psychiatric Research November 2023 167:110-118
Autor:
Price, Alex T., Schiff, Joshua P., Laugeman, Eric, Maraghechi, Borna, Schmidt, Matthew, Zhu, Tong, Reynoso, Francisco, Hao, Yao, Kim, Taeho, Morris, Eric, Zhao, Xiaodong, Hugo, Geoffrey D., Vlacich, Gregory, DeSelm, Carl J., Samson, Pamela P., Baumann, Brian C., Badiyan, Shahed N., Robinson, Clifford G., Kim, Hyun, Henke, Lauren E.
Publikováno v:
In Clinical and Translational Radiation Oncology September 2023 42
Publikováno v:
VMCAI 2020 - 21st International Conference on Verification, Model Checking, and Abstract Interpretation
In this work, we study the problem of verification of systems in the presence of attackers using bounded model checking. Given a system and a set of security requirements, we present a methodology to generate and classify attackers, mapping them to t
Externí odkaz:
http://arxiv.org/abs/1911.05808