Sciweavers

2539 search results - page 117 / 508
» Debugging Method Names
Sort
View
FTCS
1998
114views more  FTCS 1998»
15 years 3 months ago
Verification of a Safety-Critical Railway Interlocking System with Real-Time Constraints
Ensuring the correctness of computer systems used in lifecritical applications is very difficult. The most commonly used verification methods, simulation and testing, are not exha...
Vicky Hartonas-Garmhausen, Sérgio Vale Agui...
EWC
2006
61views more  EWC 2006»
15 years 2 months ago
Embarrassingly parallel mesh refinement by edge subdivision
We have previously proposed a new technique for the communication-free adaptive refinement of tetrahedral meshes that works for all configurations. Implementations of the scheme mu...
David C. Thompson, Philippe P. Pébay
132
Voted
RAS
2010
164views more  RAS 2010»
15 years 22 days ago
Towards performing everyday manipulation activities
This article investigates fundamental issues in scaling autonomous personal robots towards open-ended sets of everyday manipulation tasks which involve high complexity and vague j...
Michael Beetz, Dominik Jain, Lorenz Mösenlech...
122
Voted
BMCBI
2008
137views more  BMCBI 2008»
15 years 2 months ago
Evading the annotation bottleneck: using sequence similarity to search non-sequence gene data
Background: Non-sequence gene data (images, literature, etc.) can be found in many different public databases. Access to these data is mostly by text based methods using gene name...
Michael J. Gilchrist, Mikkel B. Christensen, Richa...
69
Voted
ICRA
2000
IEEE
92views Robotics» more  ICRA 2000»
15 years 6 months ago
Action Module Planning and its Application to an Experimental Climbing Robot
This paper presents the application of an action module planning method to an experimental climbing robot named LIBRA. The method searches for a sequence of physically realizable ...
David M. Bevly, Shane Farritor, Steven Dubowsky