Sciweavers

2911 search results - page 448 / 583
» A Logic of Graph Constraints
Sort
View
92
Voted
ICRA
2009
IEEE
188views Robotics» more  ICRA 2009»
15 years 7 months ago
Potential field guide for humanoid multicontacts acyclic motion planning
Abstract—We present a motion planning algorithm that computes rough trajectories used by a contact-points planner as a guide to grow its search graph. We adapt collision-free mot...
Karim Bouyarmane, Adrien Escande, Florent Lamiraux...
ESA
2009
Springer
109views Algorithms» more  ESA 2009»
15 years 7 months ago
Iterative Rounding for Multi-Objective Optimization Problems
In this paper we show that iterative rounding is a powerful and flexible tool in the design of approximation algorithms for multiobjective optimization problems. We illustrate tha...
Fabrizio Grandoni, R. Ravi, Mohit Singh
99
Voted
ISCIS
2009
Springer
15 years 7 months ago
Using a SAT solver to generate checking sequences
—Methods for software testing based on Finite State Machines (FSMs) have been researched since the early 60’s. Many of these methods are about generating a checking sequence fr...
Guy-Vincent Jourdan, Hasan Ural, Hüsnü Y...
CDC
2008
IEEE
109views Control Systems» more  CDC 2008»
15 years 7 months ago
Control of acyclic formations of mobile autonomous agents
— This paper proposes distributed control laws for maintaining the shape of a formation of mobile autonomous agents in the plane for which the desired shape is defined in terms ...
Ming Cao, Brian D. O. Anderson, A. Stephen Morse, ...
ECBS
2008
IEEE
86views Hardware» more  ECBS 2008»
15 years 7 months ago
A Formal Model for Network-Wide Security Analysis
Network designers perform challenging tasks with so many configuration options that it is often hard or even impossible for a human to predict all potentially dangerous situation...
Petr Matousek, Jaroslav Ráb, Ondrej Rysavy,...