Sciweavers

28 search results - page 2 / 6
» Forward Analysis for WSTS, Part I: Completions
Sort
View
ATAL
2003
Springer
13 years 10 months ago
An asynchronous complete method for distributed constraint optimization
We present a new polynomial-space algorithm, called Adopt, for distributed constraint optimization (DCOP). DCOP is able to model a large class of collaboration problems in multi-a...
Pragnesh Jay Modi, Wei-Min Shen, Milind Tambe, Mak...
SNPD
2008
13 years 6 months ago
Towards Formal Modeling and Analysis of Networks of Embedded Medical Devices in Real-Time Maude
With the increasing number of medical devices and of accidents resulting from them being used in isolation in a hectic operating room, there is a trend towards integrating such de...
Peter Csaba Ölveczky
CORR
2010
Springer
180views Education» more  CORR 2010»
13 years 5 months ago
Sawja: Static Analysis Workshop for Java
Abstract. Static analysis is a powerful technique for automatic verification of programs but raises major engineering challenges when developing a full-fledged analyzer for a reali...
Laurent Hubert, Nicolas Barré, Fréd&...
UAI
2004
13 years 6 months ago
Pre-Selection of Independent Binary Features: An Application to Diagnosing Scrapie in
Suppose that the only available information in a multi-class problem are expert estimates of the conditional probabilities of occurrence for a set of binary features. The aim is t...
Ludmila I. Kuncheva, Christopher J. Whitaker, Pete...
CCS
2008
ACM
13 years 7 months ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...