Sciweavers

3573 search results - page 351 / 715
» Reasoning about Codata
Sort
View
ICALP
2003
Springer
15 years 10 months ago
Secrecy in Untrusted Networks
We investigate the protection of migrating agents against the untrusted sites they traverse. The resulting calculus provides a formal framework to reason about protection policies ...
Michele Bugliesi, Silvia Crafa, Amela Prelic, Vlad...
133
Voted
HPDC
2002
IEEE
15 years 10 months ago
Error Scope on a Computational Grid: Theory and Practice
Error propagation is a central problem in grid computing. We re-learned this while adding a Java feature to the Condor computational grid. Our initial experience with the system w...
Douglas Thain, Miron Livny
119
Voted
ICRA
2002
IEEE
108views Robotics» more  ICRA 2002»
15 years 10 months ago
Controlling Hopping Height of a Pneumatic Monopod
We describe a model-based height controller for a hopping robot with a pneumatically powered leg. The controller explicitly models variation in the leg angle and height. Using an ...
Kale Harbick, Gaurav S. Sukhatme
ICDE
2010
IEEE
195views Database» more  ICDE 2010»
15 years 10 months ago
Interaction-Aware Prediction of Business-Intelligence Workload Completion Times
— While planning the execution of report-generation workloads, database administrators often need to know how long different query workloads will take to run. Database systems ru...
Mumtaz Ahmad, Songyun Duan, Ashraf Aboulnaga, Shiv...
ECOOP
2010
Springer
15 years 10 months ago
Verifying Generics and Delegates
Recently, object-oriented languages, such as C , have been extended with language features prevalent in most functional languages: parametric polymorphism and higher-order function...
Kasper Svendsen, Lars Birkedal, Matthew Parkinson