Sciweavers

3820 search results - page 415 / 764
» Bounded Model Debugging
Sort
View
ICRA
2010
IEEE
119views Robotics» more  ICRA 2010»
15 years 2 months ago
Optimal motion primitives for multi-UAV convoy protection
In this paper we study the problem of controlling a number of Unmanned Aerial Vehicles (UAVs) to provide convoy protection to a group of ground vehicles. The UAVs are modeled as Du...
Amirreza Rahmani, Xu Chu Ding, Magnus Egerstedt
NAACL
2010
15 years 1 months ago
Efficient Parsing of Well-Nested Linear Context-Free Rewriting Systems
The use of well-nested linear context-free rewriting systems has been empirically motivated for modeling of the syntax of languages with discontinuous constituents or relatively f...
Carlos Gómez-Rodríguez, Marco Kuhlma...
CORR
2011
Springer
169views Education» more  CORR 2011»
14 years 7 months ago
Percolation in the Secrecy Graph
— Secrecy graphs model the connectivity of wireless networks under secrecy constraints. Directed edges in the graph are present whenever a node can talk to another node securely ...
Amites Sarkar, Martin Haenggi
DAC
2004
ACM
16 years 5 months ago
A SAT-based algorithm for reparameterization in symbolic simulation
Parametric representations used for symbolic simulation of circuits usually use BDDs. After a few steps of symbolic simulation, state set representation is converted from one para...
Pankaj Chauhan, Edmund M. Clarke, Daniel Kroening
ALT
2006
Springer
16 years 1 months ago
Active Learning in the Non-realizable Case
Most of the existing active learning algorithms are based on the realizability assumption: The learner’s hypothesis class is assumed to contain a target function that perfectly c...
Matti Kääriäinen