Sciweavers

1036 search results - page 146 / 208
» Verification Programs for Abduction
Sort
View
EICS
2009
ACM
15 years 11 months ago
Engineering crowd interaction within smart environments
Smart environments (e.g., airports, hospitals, stadiums, and other physical spaces using ubiquitous computing to empower many mobile people) provide novel challenges for usability...
Michael D. Harrison, Mieke Massink, Diego Latella
GECCO
2005
Springer
136views Optimization» more  GECCO 2005»
15 years 10 months ago
Stress testing real-time systems with genetic algorithms
Reactive real-time systems have to react to external events within time constraints: Triggered tasks must execute within deadlines. The goal of this article is to automate, based ...
Lionel C. Briand, Yvan Labiche, Marwa Shousha
ISSTA
2004
ACM
15 years 10 months ago
Faster constraint solving with subtypes
Constraints in predicate or relational logic can be translated into boolean logic and solved with a SAT solver. For faster solving, it is common to exploit the typing of predicate...
Jonathan Edwards, Daniel Jackson, Emina Torlak, Vi...
FORMATS
2004
Springer
15 years 10 months ago
Bounded Model Checking for Region Automata
For successful software verification, model checkers must be capable of handling a large number of program variables. Traditional, BDD-based model checking is deficient in this reg...
Fang Yu, Bow-Yaw Wang, Yao-Wen Huang
SIGSOFT
2003
ACM
15 years 9 months ago
Fluent model checking for event-based systems
Model checking is an automated technique for verifying that a system satisfies a set of required properties. Such properties are typically expressed as temporal logic formulas, in...
Dimitra Giannakopoulou, Jeff Magee