Sciweavers

4340 search results - page 209 / 868
» Formal Methods and Cryptography
Sort
View
148
Voted
AI
2004
Springer
15 years 10 months ago
Constraint Satisfaction Methods for Information Personalization
Constraints formalize the dependencies in a physical world in terms of a logical relation among several unknowns. Constraint satisfaction methods allow efficient navigation of larg...
Syed Sibte Raza Abidi, Yong Han Chong
MEMOCODE
2003
IEEE
15 years 9 months ago
Methods for exploiting SAT solvers in unbounded model checking
— Modern SAT solvers have proved highly successful in finding counterexamples to temporal properties of systems, using a method known as ”bounded model checking”. It is natu...
Kenneth L. McMillan
APN
2007
Springer
15 years 10 months ago
A Compositional Method for the Synthesis of Asynchronous Communication Mechanisms
Asynchronous data communication mechanisms (ACMs) have been extensively studied as data connectors between independently timed concurrent processes. In previous work, an automatic ...
Kyller Costa Gorgônio, Jordi Cortadella, Fei...
ATAL
2004
Springer
15 years 10 months ago
Using the Experimental Method to Produce Reliable Self-Organised Systems
The ‘engineering’ and ‘adaptive’ approaches to system production are distinguished. It is argued that producing reliable self-organised software systems (SOSS) will necessa...
Bruce Edmonds
IJCM
2007
53views more  IJCM 2007»
15 years 4 months ago
Splitting methods for non-autonomous linear systems
We present splitting methods for numerically solving a certain class of explicitly time-dependent linear differential equations. Starting from an efficient method for the autonom...
Sergio Blanes, Fernando Casas, Ander Murua