Sciweavers

819 search results - page 150 / 164
» Using Assumptions to Distribute CTL Model Checking
Sort
View
90
Voted
SACMAT
2009
ACM
15 years 4 months ago
Analysis of virtual machine system policies
The recent emergence of mandatory access (MAC) enforcement for virtual machine monitors (VMMs) presents an opportunity to enforce a security goal over all its virtual machines (VM...
Sandra Rueda, Hayawardh Vijayakumar, Trent Jaeger
GECCO
2007
Springer
180views Optimization» more  GECCO 2007»
15 years 4 months ago
Genetic optimization for yacht design
This paper introduces a procedure for using genetic multiobjective optimization in yacht design. The problem described consists on the optimization of a bulb shape to improve the ...
Paolo Geremia, Mauro Poian, Silvia Poles
92
Voted
ICRA
2010
IEEE
301views Robotics» more  ICRA 2010»
14 years 8 months ago
People tracking with human motion predictions from social forces
Abstract— For many tasks in populated environments, robots need to keep track of present and future motion states of people. Most approaches to people tracking make weak assumpti...
Matthias Luber, Johannes Andreas Stork, Gian Diego...
ADHOC
2007
169views more  ADHOC 2007»
14 years 10 months ago
Ensuring strong data guarantees in highly mobile ad hoc networks via quorum systems
Ensuring the consistency and the availability of replicated data in highly mobile ad hoc networks is a challenging task because of the lack of a backbone infrastructure. Previous ...
Daniela Tulone
ICS
2007
Tsinghua U.
15 years 4 months ago
Automatic nonblocking communication for partitioned global address space programs
Overlapping communication with computation is an important optimization on current cluster architectures; its importance is likely to increase as the doubling of processing power ...
Wei-Yu Chen, Dan Bonachea, Costin Iancu, Katherine...