Sciweavers

22698 search results - page 4391 / 4540
» Modeling in Software Engineering
Sort
View
CAV
2010
Springer
161views Hardware» more  CAV 2010»
15 years 2 months ago
Directed Proof Generation for Machine Code
We present the algorithms used in MCVETO (Machine-Code VErification TOol), a tool to check whether a stripped machinecode program satisfies a safety property. The verification p...
Aditya V. Thakur, Junghee Lim, Akash Lal, Amanda B...
89
Voted
DATE
2009
IEEE
138views Hardware» more  DATE 2009»
15 years 2 months ago
An approximation scheme for energy-efficient scheduling of real-time tasks in heterogeneous multiprocessor systems
As application complexity increases, modern embedded systems have adopted heterogeneous processing elements to enhance the computing capability or to reduce the power consumption. ...
Chuan-Yue Yang, Jian-Jia Chen, Tei-Wei Kuo, Lothar...
FUN
2007
Springer
120views Algorithms» more  FUN 2007»
15 years 2 months ago
Drawing Borders Efficiently
A spreadsheet, especially MS Excel, is probably one of the most popular software applications for personal-computer users and gives us convenient and user-friendly tools for drawin...
Kazuo Iwama, Eiji Miyano, Hirotaka Ono
ACMICEC
2006
ACM
110views ECommerce» more  ACMICEC 2006»
15 years 1 months ago
Learning inventory management strategies for commodity supply chains with customer satisfaction
In this paper, we look at a supply chain of commodity goods where customer demand is uncertain and partly based on reputation, and where raw material replenishment is uncertain in...
Jeroen van Luin, Han La Poutré, J. Will M. ...
CASSIS
2004
Springer
15 years 1 months ago
Verification of Safety Properties in the Presence of Transactions
The JAVA CARD transaction mechanism can ensure that a sequence of statements either is executed to completion or is not executed at all. Transactions make verification of JAVA CARD...
Reiner Hähnle, Wojciech Mostowski
« Prev « First page 4391 / 4540 Last » Next »