Sciweavers

2451 search results - page 425 / 491
» The Octagon Abstract Domain
Sort
View
108
Voted
GLOBECOM
2009
IEEE
14 years 10 months ago
Measurements of Multicast Service Discovery in a Campus Wireless Network
Abstract--Applications using multicast service discovery protocols, such as iTunes, have become increasingly popular. However, multicast service discovery protocols generate signif...
Se Gi Hong, Suman Srinivasan, Henning Schulzrinne
117
Voted
ICAIL
2009
ACM
14 years 10 months ago
Case law in extended argumentation frameworks
In this paper we discuss how recent developments in argumentation frameworks, most notably Extended Argumentation Frameworks, can inform the representation of a body of case law u...
Trevor J. M. Bench-Capon, Sanjay Modgil
111
Voted
ICRA
2009
IEEE
196views Robotics» more  ICRA 2009»
14 years 10 months ago
CHOMP: Gradient optimization techniques for efficient motion planning
Abstract-- Existing high-dimensional motion planning algorithms are simultaneously overpowered and underpowered. In domains sparsely populated by obstacles, the heuristics used by ...
Nathan D. Ratliff, Matt Zucker, J. Andrew Bagnell,...
ICSE
2009
IEEE-ACM
14 years 10 months ago
Extended eTVRA vs. security checklist: Experiences in a value-web
Abstract--Security evaluation according to ISO 15408 (Common Criteria) is a resource and time demanding activity, as well as being costly. For this reason, only few companies take ...
Ayse Morali, Emmanuele Zambon, Siv Hilde Houmb, Ka...
ICST
2009
IEEE
14 years 10 months ago
Proving Functional Equivalence of Two AES Implementations Using Bounded Model Checking
Bounded model checking--as well as symbolic equivalence checking--are highly successful techniques in the hardware domain. Recently, bit-vector bounded model checkers like CBMC ha...
Hendrik Post, Carsten Sinz