Sciweavers

3820 search results - page 424 / 764
» Bounded Model Debugging
Sort
View
127
Voted
PET
2009
Springer
15 years 10 months ago
Using Linkability Information to Attack Mix-Based Anonymity Services
There exist well established models for anonymity focusing on traffic analysis, i. e., analysing properties of single messages as, e. g., timing. However there is only little work ...
Stefan Schiffner, Sebastian Clauß
RR
2009
Springer
15 years 10 months ago
A Logic Based Approach to the Static Analysis of Production Systems
In this paper we present an embedding of propositional production systems into µ-calculus, and first-order production systems into fixed-point logic, with the aim of using these...
Jos de Bruijn, Martín Rezk
ASPDAC
2009
ACM
142views Hardware» more  ASPDAC 2009»
15 years 10 months ago
On the futility of statistical power optimization
In response to the increasing variations in integrated-circuit manufacturing, the current trend is to create designs that take these variations into account statistically. In this...
Jason Cong, Puneet Gupta, John Lee
129
Voted
ICRA
2008
IEEE
197views Robotics» more  ICRA 2008»
15 years 10 months ago
A Bayesian framework for optimal motion planning with uncertainty
— Modeling robot motion planning with uncertainty in a Bayesian framework leads to a computationally intractable stochastic control problem. We seek hypotheses that can justify a...
Andrea Censi, Daniele Calisi, Alessandro De Luca, ...
RTSS
2008
IEEE
15 years 10 months ago
Symbolic Computation of Schedulability Regions Using Parametric Timed Automata
In this paper, we address the problem of symbolically computing the region in the parameter’s space that guarantees a feasible schedule, given a set of real-time tasks character...
Alessandro Cimatti, Luigi Palopoli, Yusi Ramadian