Sciweavers

2468 search results - page 221 / 494
» On Model Checking Techniques for Randomized Distributed Syst...
Sort
View
145
Voted
WISES
2003
15 years 5 months ago
Automatic Recovery of the TTP/A Sensor/Actuator Network
Abstract — Since sensor/actuator networks are to be used in error-prone environments, it is required that media access protocols for such networks are tolerant to failures. Field...
Wilfried Steiner, Wilfried Elmenreich
CC
2003
Springer
102views System Software» more  CC 2003»
15 years 9 months ago
Precision in Practice: A Type-Preserving Java Compiler
Popular mobile code architectures (Java and .NET) include verifiers to check for memory safety and other security properties. Since their formats are relatively high level, suppor...
Christopher League, Zhong Shao, Valery Trifonov
139
Voted
CDC
2010
IEEE
129views Control Systems» more  CDC 2010»
14 years 11 months ago
A symbolic approach to controlling piecewise affine systems
Abstract-- We present a computational framework for automatic synthesis of a feedback control strategy for a piecewise affine (PWA) system from a specification given as a Linear Te...
Jana Tumova, Boyan Yordanov, Calin Belta, Ivana Ce...
ICDE
2008
IEEE
139views Database» more  ICDE 2008»
16 years 5 months ago
Simultaneous Equation Systems for Query Processing on Continuous-Time Data Streams
We introduce Pulse, a framework for processing continuous queries over models of continuous-time data, which can compactly and accurately represent many real-world activities and p...
Jennie Rogers, Olga Papaemmanouil, Ugur Çet...
IPPS
2007
IEEE
15 years 10 months ago
Replication Strategy in Unstructured Peer-to-Peer Systems
1 The unstructured Peer-to-Peer (P2P) systems usually use a “blind search” method to find the requested data object by propagating a query to a number of peers randomly. In or...
Guofu Feng, Yuquan Jiang, Guihai Chen, Qing Gu, Sa...