Sciweavers

3555 search results - page 614 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
IJCAI
1989
15 years 2 months ago
A Theorem Prover for Prioritized Circumscription
In a recent paper, Ginsberg shows how a backward-chaining ATMS can be used to construct a theorem prover for circumscription. Here, this work is extended to handle prioritized cir...
Andrew B. Baker, Matthew L. Ginsberg
ICRA
2009
IEEE
176views Robotics» more  ICRA 2009»
15 years 8 months ago
Rollin' Justin - Mobile platform with variable base
Abstract— Research on humanoid robots for use in servicing tasks, e.g. fetching and delivery, attracts steadily more interest. With ”Rollin’ Justin” a mobile robotic system...
Christoph Borst, Thomas Wimböck, Florian Schm...
ELECTRONICMARKETS
1998
117views more  ELECTRONICMARKETS 1998»
15 years 1 months ago
Towards Open Electronic Contracting
AbstractAbstractAbstractAbstract A design and pilot implementation of a system, called InterProcs, supporting electronic contracting is presented. A key concept in the design of th...
Ronald M. Lee
JCISE
2002
128views more  JCISE 2002»
15 years 1 months ago
A Collaborative Framework for Integrated Part and Assembly Modeling
An ideal product modeling system should support both part modeling and assembly modeling, instead of just either of them as is the case in most current CAD systems. A good basis f...
Rafael Bidarra, Niels Kranendonk, Alex Noort, Will...
SIGSOFT
2008
ACM
16 years 2 months ago
Profile-guided program simplification for effective testing and analysis
Many testing and analysis techniques have been developed for inhouse use. Although they are effective at discovering defects before a program is deployed, these techniques are oft...
Lingxiao Jiang, Zhendong Su