Sciweavers

1968 search results - page 239 / 394
» The Complexity of Valued Constraint Models
Sort
View
FM
2009
Springer
163views Formal Methods» more  FM 2009»
15 years 6 months ago
Analysis of a Clock Synchronization Protocol for Wireless Sensor Networks
We study a clock synchronization protocol for the Chess WSN. First, we model the protocol as a network of timed automata and verify various instances using the Uppaal model checker...
Faranak Heidarian, Julien Schmaltz, Frits W. Vaand...
AADEBUG
1997
Springer
15 years 5 months ago
Bisection Debugging
This paper introduces the bisection debugging model. The key idea is to use a debugger to identify the semantic differences between two versions of the same program. The debugger ...
Thomas R. Gross
EATIS
2007
ACM
15 years 5 months ago
Analysing and enhancing business processes and IT-systems for mobile workforce automation: a framework approach
Mobile B2E-applications (business-to-employee) can add significant value to a company's business, when large workforce divisions are involved in the execution of certain busi...
Volker Gruhn, André Köhler
AAAI
2007
15 years 4 months ago
Search Space Reduction and Russian Doll Search
In a constraint optimization problem (COP), many feasible valuations lead to the same objective value. This often means a huge search space and poor performance in the propagation...
Kenil C. K. Cheng, Roland H. C. Yap
JBCS
2002
94views more  JBCS 2002»
15 years 1 months ago
Optimistic Replication in Pharos, a Collaborative Application on the Web
Pharos is a collaborative application which enables users to share document annotations. Annotations of a same subject are stored altogether in channels, and channels are replicat...
Esther Pacitti, Olivier Dedieu