Sciweavers

3555 search results - page 197 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
TCS
2008
15 years 4 months ago
Integration of a security type system into a program logic
Type systems and program logics are often conceived to be at opposing ends of the spectrum of formal software analyses. In this paper we show that a flow-sensitive type system ensu...
Reiner Hähnle, Jing Pan, Philipp Rümmer,...
ICCAD
1999
IEEE
66views Hardware» more  ICCAD 1999»
15 years 8 months ago
Test scheduling for core-based systems
We present optimal solutions to the test scheduling problem for core-based systems. We show that test scheduling is equivalent to the m-processor open-shop scheduling problem and ...
Krishnendu Chakrabarty
ICRA
1998
IEEE
86views Robotics» more  ICRA 1998»
15 years 8 months ago
Kinematic Manipulability of General Constrained Rigid Multibody Systems
This paper extends the kinematic manipulability concept commonly used for serial manipulators to general constrained rigid multibody systems. Examples of such systems include multi...
John T. Wen, Lee S. Wilfinger
AI
2006
Springer
15 years 4 months ago
The complexity of soft constraint satisfaction
Over the past few years there has been considerable progress in methods to systematically analyse the complexity of constraint satisfaction problems with specified constraint type...
David A. Cohen, Martin C. Cooper, Peter Jeavons, A...
123
Voted
AUTOMATICA
2002
100views more  AUTOMATICA 2002»
15 years 4 months ago
An analysis and design method for linear systems subject to actuator saturation and disturbance
We present a method for estimating the domain of attraction of the origin for a system under a saturated linear feedback. A simple condition is derived in terms of an auxiliary fe...
Tingshu Hu, Zongli Lin, Ben M. Chen