Sciweavers

2500 search results - page 194 / 500
» Specifying Behavior in C
Sort
View
112
Voted
SODA
2003
ACM
125views Algorithms» more  SODA 2003»
15 years 5 months ago
Random MAX SAT, random MAX CUT, and their phase transitions
With random inputs, certain decision problems undergo a “phase transition”. We prove similar behavior in an optimization context. Given a conjunctive normal form (CNF) formula...
Don Coppersmith, David Gamarnik, Mohammad Taghi Ha...
120
Voted
GECCO
2005
Springer
114views Optimization» more  GECCO 2005»
15 years 9 months ago
A resource-allocation mechanism for multiagent networks
The nature of computer networks and the manner in which network services are provided are changing dramatically. Network architectures that employ virtual mobile agents to provide...
Vishakh, Nicholas Urrea, Tadashi Nakano, Tatsuya S...
132
Voted
SEKE
2005
Springer
15 years 9 months ago
Generating Properties for Runtime Monitoring from Software Specification Patterns
The paper presents an approach to support run-time verification of software systems that combines two existing tools, Prospec and Java-MaC, into a single framework. Prospec can be...
Oscar Mondragon, Ann Q. Gates, Humberto Mendoza, O...
124
Voted
LCN
2003
IEEE
15 years 9 months ago
Implementation of Resilient Packet Ring Nodes Using Network Processors
Network processors offer a new flexibility for network applications and reduce the time to market for data processing systems. In this paper, we describe the changed development p...
Andreas Kirstädter, Axel Hof, Walter Meyer, E...
SIGMETRICS
2010
ACM
227views Hardware» more  SIGMETRICS 2010»
15 years 8 months ago
Characterizing and modeling user activity on smartphones: summary
In this paper, we present a comprehensive analysis of real smartphone usage during a 6-month study of real user activity on the Android G1 smartphone. Our goal is to study the hig...
Alex Shye, Benjamin Scholbrock, Gokhan Memik, Pete...