Sciweavers

1712 search results - page 150 / 343
» Abstract Constraint Data Types
Sort
View
COMPUTER
2000
128views more  COMPUTER 2000»
15 years 2 months ago
What's Ahead for Embedded Software?
hysical world. How do you adapt software abstractions designed merely to transform data to meet requirements like real-time constraints, concurrency, and stringent safety considera...
Edward A. Lee
ICRA
2008
IEEE
133views Robotics» more  ICRA 2008»
15 years 9 months ago
Deployment algorithms for a power-constrained mobile sensor network
Abstract— This paper presents coverage algorithms for mobile sensor networks in which agents have limited power to move. Rather than making use of a constrained optimization tech...
Andrew Kwok, Sonia Martínez
FROCOS
2005
Springer
15 years 8 months ago
A Comprehensive Framework for Combined Decision Procedures
We define a general notion of a fragment within higher order type theory; a procedure for constraint satisfiability in combined fragments is outlined, following Nelson-Oppen sche...
Silvio Ghilardi, Enrica Nicolini, Daniele Zucchell...
ICTCS
2005
Springer
15 years 8 months ago
Checking Risky Events Is Enough for Local Policies
Abstract. An extension of the λ-calculus is proposed to study historybased access control. It allows for parametrized security policies with a possibly nested, local scope. To gov...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
ICWE
2005
Springer
15 years 8 months ago
Light-Weight Distributed Web Interfaces: Preparing the Web for Heterogeneous Environments
Abstract. In this paper we show an approach that allows web interfaces to dynamically distribute among several interconnected heterogeneous devices in an environment to support the...
Chris Vandervelpen, Geert Vanderhulst, Kris Luyten...