Bounded model checking has been recently introduced as an efficient verification method for reactive systems. In this work we apply bounded model checking to asynchronous systems....
The integration of active database technology into mobile database systems allows to limit the transfer of data between mobile computers and the stationary network. In order to em...
This paper deals with the problem of determining the optimal inspection strategy for a multi-stage production process using simulation optimization. An optimal inspection strategy...
Vahid Sarhangian, Abolfazl Vaghefi, Hamidreza Eska...
In this paper, we present a logic-based computational model for movement theory in Government and Binding Theory. For that purpose, we have designed a language called DISLOG. DISL...
Abstract. Multicore, multithreaded processors are rapidly becoming the platform of choice for high-throughput request-processing applications (RPAs). We refer to this class of mode...