Sciweavers

4513 search results - page 621 / 903
» Logic programming with satisfiability
Sort
View
IFIP
2004
Springer
15 years 9 months ago
Pattern-Matching Spi-Calculus
Cryptographic protocols often make use of nested cryptographic primitives, for example signed message digests, or encrypted signed messages. Gordon and Jeffrey’s prior work on ty...
Christian Haack, Alan Jeffrey
ICRA
2003
IEEE
143views Robotics» more  ICRA 2003»
15 years 9 months ago
Cooperative task planning of multi-robot systems with temporal constraints
This paper discusses a design methodology of cooperative trajectory generation for multi-robot systems. The trajectory of achieving cooperative tasks, i.e., with temporal constrai...
Feng-Li Lian, Richard M. Murray
FPL
2001
Springer
123views Hardware» more  FPL 2001»
15 years 8 months ago
Compilation Increasing the Scheduling Scope for Multi-memory-FPGA-Based Custom Computing Machines
This paper presents new achievements on the automatic mapping of algorithms, written in imperative software programming languages, to custom computing machines. The reconfigurable ...
João M. P. Cardoso, Horácio C. Neto
151
Voted
FMSP
2000
ACM
152views Formal Methods» more  FMSP 2000»
15 years 8 months ago
Fault origin adjudication
When a program P fails to satisfy a requirement R supposedly ensured by a detailed speci cation S that was used to implement P, there is a question about whether the problem arise...
Karthikeyan Bhargavan, Carl A. Gunter, Davor Obrad...
CVPR
2010
IEEE
15 years 8 months ago
Learning Weights for Codebook in Image Classification
This paper presents a codebook learning approach for image classification and retrieval. It corresponds to learning a weighted similarity metric to satisfy that the weighted simil...
Hongping Cai, Krystian Mikolajczyk, Fei Yan