Sciweavers

107 search results - page 6 / 22
» Planning and Patching Proof
Sort
View
WWW
2004
ACM
15 years 10 months ago
Securing web application code by static analysis and runtime protection
Security remains a major roadblock to universal acceptance of the Web for many kinds of transactions, especially since the recent sharp increase in remotely exploitable vulnerabil...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
CSL
2010
Springer
14 years 10 months ago
A Formalisation of the Normal Forms of Context-Free Grammars in HOL4
We describe the formalisation of the normal forms of context-free grammars (CFGs) using the HOL4 theorem prover. These straightforward pen and paper proofs easily understood from t...
Aditi Barthwal, Michael Norrish
COMPGEOM
1994
ACM
15 years 1 months ago
Almost Tight Upper Bounds for the Single Cell and Zone Problems in Three Dimensions
We consider the problem of bounding the combinatorial complexity of a single cell in an arrangement of n low-degree algebraic surface patches in 3-space. We show that this complex...
Dan Halperin, Micha Sharir
ICRA
2010
IEEE
127views Robotics» more  ICRA 2010»
14 years 8 months ago
Probabilistically complete planning with end-effector pose constraints
Abstract— We present a proof for the probabilistic completeness of RRT-based algorithms when planning with constraints on end-effector pose. Pose constraints can induce lowerdime...
Dmitry Berenson, Siddhartha S. Srinivasa
AIPS
1996
14 years 10 months ago
Deduction-Based Refinement Planning
Weintroduce a method of deduction-based refinement planning where prefabricated general solutions are adapted to special problems. Refmementproceeds by stepwise transforming nonco...
Werner Stephan, Susanne Biundo