Sciweavers

7103 search results - page 499 / 1421
» Program Generation and Components
Sort
View
SIGSOFT
2003
ACM
16 years 5 months ago
A strategy for efficiently verifying requirements
This paper describes a compositional proof strategy for verifying properties of requirements specifications. The proof strategy, which may be applied using either a model checker ...
Ralph D. Jeffords, Constance L. Heitmeyer
ICRA
2007
IEEE
173views Robotics» more  ICRA 2007»
15 years 11 months ago
Reaction Mass Pendulum (RMP): An explicit model for centroidal angular momentum of humanoid robots
Abstract— A number of conceptually simple but behaviorrich “inverted pendulum” humanoid models have greatly enhanced the understanding and analytical insight of humanoid dyna...
Sung-Hee Lee, Ambarish Goswami
NDSS
2007
IEEE
15 years 11 months ago
Generic Application-Level Protocol Analyzer and its Language
Application-level protocol analyzers are important components in tools such as intrusion detection systems, firewalls, and network monitors. Currently, protocol analyzers are wri...
Nikita Borisov, David Brumley, Helen J. Wang, John...
153
Voted
GECCO
2007
Springer
181views Optimization» more  GECCO 2007»
15 years 11 months ago
ACOhg: dealing with huge graphs
Ant Colony Optimization (ACO) has been successfully applied to those combinatorial optimization problems which can be translated into a graph exploration. Artificial ants build s...
Enrique Alba, J. Francisco Chicano
LCPC
2004
Springer
15 years 10 months ago
Empirical Performance-Model Driven Data Layout Optimization
Abstract. Empirical optimizers like ATLAS have been very effective in optimizing computational kernels in libraries. The best choice of parameters such as tile size and degree of l...
Qingda Lu, Xiaoyang Gao, Sriram Krishnamoorthy, Ge...