Sciweavers

4340 search results - page 187 / 868
» Formal Methods and Cryptography
Sort
View
ISEMANTICS
2010
15 years 2 months ago
Towards an approach for formalizing the supply chain operations
Reference models play an important role in the knowledge management of the various complex collaboration domains (such as Supply Chain Networks). However, they often show a lack o...
Milan Zdravkovic, Hervé Panetto, Miroslav T...
TII
2010
113views Education» more  TII 2010»
14 years 11 months ago
An Automated Framework for Formal Verification of Timed Continuous Petri Nets
In this paper, we develop an automated framework for formal verification of timed continuous Petri nets (ContPNs). Specifically, we consider two problems: (1) given an initial set ...
Marius Kloetzer, Cristian Mahulea, Calin Belta, Ma...
USAB
2007
15 years 5 months ago
User-Centered Methods Are Insufficient for Safety Critical Systems
The traditional approaches of HCI are essential, but they are unable to cope with the complexity of typical modern interactive devices in the safety critical context of medical dev...
Harold W. Thimbleby
134
Voted
ICML
2003
IEEE
16 years 5 months ago
The Use of the Ambiguity Decomposition in Neural Network Ensemble Learning Methods
We analyze the formal grounding behind Negative Correlation (NC) Learning, an ensemble learning technique developed in the evolutionary computation literature. We show that by rem...
Gavin Brown, Jeremy L. Wyatt
CODES
2006
IEEE
15 years 10 months ago
A formal approach to robustness maximization of complex heterogeneous embedded systems
Embedded system optimization typically considers objectives such as cost, timing, buffer sizes and power consumption. Robustness criteria, i.e. sensitivity of the system to variat...
Arne Hamann, Razvan Racu, Rolf Ernst