Sciweavers

2268 search results - page 177 / 454
» The Essence of Form Abstraction
Sort
View
VMCAI
2004
Springer
15 years 7 months ago
Liveness with Invisible Ranking
The method of Invisible Invariants was developed originally in order to verify safety properties of parameterized systems fully automatically. Roughly speaking, the method is based...
Yi Fang, Nir Piterman, Amir Pnueli, Lenore D. Zuck
122
Voted
WAIM
2004
Springer
15 years 7 months ago
An Empirical Study of Building Compact Ensembles
Abstract. Ensemble methods can achieve excellent performance relying on member classifiers’ accuracy and diversity. We conduct an empirical study of the relationship of ensemble...
Huan Liu, Amit Mandvikar, Jigar Mody
COMPSAC
2003
IEEE
15 years 7 months ago
A Graph Grammar Approach to Software Architecture Verification and Transformation
Software architecture and design are usually modeled and represented by informal diagrams, such as architecture diagrams and UML diagrams. While these graphic notations are easy t...
Jun Kong, Kang Zhang, Jing Dong, Guang-Lei Song
INFOCOM
2003
IEEE
15 years 7 months ago
Cooperative Peer Groups in NICE
Abstract— We present a distributed scheme for trust inference in peer-to-peer networks. Our work is in context of the NICE system, which is a platform for implementing cooperativ...
Seungjoon Lee, Rob Sherwood, Samrat Bhattacharjee
WORDS
2003
IEEE
15 years 7 months ago
Input-Dependency Analysis for Hard Real-Time Software
The execution time of software for hard real-time systems must be predictable. Further, safe and not overly pessimistic bounds for the worst-case execution time (WCET) must be com...
Jan Gustafsson, Björn Lisper, Raimund Kirner,...