Sciweavers

144 search results - page 23 / 29
» Approximate Reasoning in MAS: Rough Set Approach
Sort
View
CAV
2009
Springer
150views Hardware» more  CAV 2009»
16 years 6 days ago
Automated Analysis of Java Methods for Confidentiality
We address the problem of analyzing programs such as J2ME midlets for mobile devices, where a central correctness requirement concerns confidentiality of data that the user wants t...
Pavol Cerný, Rajeev Alur
88
Voted
ICCD
2002
IEEE
110views Hardware» more  ICCD 2002»
15 years 8 months ago
Efficient PEEC-Based Inductance Extraction Using Circuit-Aware Techniques
Practical approaches for on-chip inductance extraction to obtain a sparse, stable and accurate inverse inductance matrix K are proposed. The novelty of our work is in using circui...
Haitian Hu, Sachin S. Sapatnekar
FLAIRS
2008
15 years 2 months ago
Learning Continuous Action Models in a Real-Time Strategy Environment
Although several researchers have integrated methods for reinforcement learning (RL) with case-based reasoning (CBR) to model continuous action spaces, existing integrations typic...
Matthew Molineaux, David W. Aha, Philip Moore
CCGRID
2003
IEEE
15 years 5 months ago
Creating Services with Hard Guarantees from Cycle-Harvesting Systems
Abstract— Cycle-harvesting software on commodity computers is available from a number of companies and a significant part of the Grid computing landscape. However, creating comm...
Chris Kenyon, Giorgos Cheliotis
PERVASIVE
2008
Springer
14 years 11 months ago
Localized power-aware routing in linear wireless sensor networks
Energy-efficency is a key concern when designing protocols for wireless sensor networks (WSN). This is of particular importance in commercial applications where demonstrable retur...
Marco Zimmerling, Waltenegus Dargie, Johnathan M. ...