Sciweavers

571 search results - page 80 / 115
» Performing causality analysis by bounded model checking
Sort
View
ENTCS
2002
139views more  ENTCS 2002»
14 years 11 months ago
Automatic Verification of the IEEE-1394 Root Contention Protocol with KRONOS and PRISM
We report on the automatic verification of timed probabilistic properties of the IEEE 1394 root contention protocol combining two existing tools: the real-time modelchecker Kronos...
Conrado Daws, Marta Z. Kwiatkowska, Gethin Norman
CEC
2010
IEEE
15 years 26 days ago
An analysis of massively distributed evolutionary algorithms
Computational science is placing new demands on optimization algorithms as the size of data sets and the computational complexity of scientific models continue to increase. As thes...
Travis J. Desell, David P. Anderson, Malik Magdon-...
JSS
2007
93views more  JSS 2007»
14 years 11 months ago
Resource management for real-time tasks in mobile robotics
Coordinated behavior of mobile robots is an important emerging application area. Different coordinated behaviors can be achieved by assigning sets of control tasks, or strategies...
Huan Li, Krithi Ramamritham, Prashant J. Shenoy, R...
PODS
2001
ACM
190views Database» more  PODS 2001»
15 years 12 months ago
On the Effects of Dimensionality Reduction on High Dimensional Similarity Search
The dimensionality curse has profound e ects on the effectiveness of high-dimensional similarity indexing from the performance perspective. One of the well known techniques for im...
Charu C. Aggarwal
123
Voted
DSN
2003
IEEE
15 years 5 months ago
A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities
This paper combines an analysis of data on security vulnerabilities (published in Bugtraq database) and a focused source-code examination to develop a finite state machine (FSM) m...
Shuo Chen, Zbigniew Kalbarczyk, Jun Xu, Ravishanka...