Sciweavers

16 search results - page 2 / 4
» Symbolic Approaches for Finding Control Strategies in Boolea...
Sort
View
DATE
1998
IEEE
103views Hardware» more  DATE 1998»
13 years 9 months ago
Efficient Encoding Schemes for Symbolic Analysis of Petri Nets
Petri nets are a graph-based formalism appropriate to model concurrentsystems such as asynchronouscircuits or network protocols. Symbolic techniques based on Binary Decision Diagr...
Enric Pastor, Jordi Cortadella
PLDI
2010
ACM
14 years 2 months ago
The Reachability-Bound Problem
We define the reachability-bound problem to be the problem of finding a symbolic worst-case bound on the number of times a given control location inside a procedure is visited in ...
Sumit Gulwani, Florian Zuleger
TSP
2008
134views more  TSP 2008»
13 years 4 months ago
Effect of Function Perturbation on the Steady-State Distribution of Genetic Regulatory Networks: Optimal Structural Intervention
Abstract--The dynamics of a rule-based gene regulatory network are determined by the regulatory functions in conjunction with whatever probability distributions are involved in net...
Xiaoning Qian, Edward R. Dougherty
AAAI
2004
13 years 6 months ago
Leap Before You Look: An Effective Strategy in an Oversubscribed Scheduling Problem
Oversubscribed scheduling problems require removing or partially satisfying tasks when enough resources are not available. For a particular oversubscribed problem, Air Force Satel...
Laura Barbulescu, L. Darrell Whitley, Adele E. How...
JSAC
2010
188views more  JSAC 2010»
13 years 3 days ago
Random-walk based approach to detect clone attacks in wireless sensor networks
Abstract--Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, a...
Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqin...