Sciweavers

612 search results - page 75 / 123
» Bounded model checking for knowledge and real time
Sort
View
FCT
1997
Springer
15 years 1 months ago
Trade-Off Results for Connection Management
A connection management protocol establishes a connection between two hosts across a wide-area network to allow reliable message delivery. Following previous work of Kleinberg et a...
Marios Mavronicolas, Nikos Papadakis
CORR
2010
Springer
144views Education» more  CORR 2010»
14 years 9 months ago
Algorithmic Verification of Single-Pass List Processing Programs
We introduce streaming data string transducers that map input data strings to output data strings in a single left-to-right pass in linear time. Data strings are (unbounded) seque...
Rajeev Alur, Pavol Cerný
TACAS
1998
Springer
81views Algorithms» more  TACAS 1998»
15 years 1 months ago
Formal Design and Analysis of a Gear Controller
In this paper, we report on an application of the validation and veri cation tool kit Uppaal in the design and analysis of a prototype gear controller, carried out in a joint proje...
Magnus Lindahl, Paul Pettersson, Wang Yi
KES
2008
Springer
14 years 9 months ago
Privacy Risks in Trajectory Data Publishing: Reconstructing Private Trajectories from Continuous Properties
Abstract. Location and time information about individuals can be captured through GPS devices, GSM phones, RFID tag readers, and by other similar means. Such data can be pre-proces...
Emre Kaplan, Thomas Brochmann Pedersen, Erkay Sava...
JSS
2007
93views more  JSS 2007»
14 years 9 months ago
Resource management for real-time tasks in mobile robotics
Coordinated behavior of mobile robots is an important emerging application area. Different coordinated behaviors can be achieved by assigning sets of control tasks, or strategies...
Huan Li, Krithi Ramamritham, Prashant J. Shenoy, R...