Sciweavers

549 search results - page 29 / 110
» Verification condition generation for conditional informatio...
Sort
View
97
Voted
WCE
2007
15 years 1 months ago
A Multi-Agent Approach for Intelligent Traffic-Light Control
—In this paper we propose a multi-agent approach for traffic-light control. According to this approach, our system consists of agents and their world. In this context, the world ...
Visit Hirankitti, Jaturapith Krohkaew, Christopher...
95
Voted
UTP
2010
14 years 10 months ago
Unifying Theories of Confidentiality
Abstract. This paper presents a framework for reasoning about the security of confidential data within software systems. A novelty is that we use Hoare and He's Unifying Theor...
Michael J. Banks, Jeremy L. Jacob
121
Voted
PE
2008
Springer
113views Optimization» more  PE 2008»
15 years 13 days ago
Joint uplink and downlink admission control to both streaming and elastic flows in CDMA/HSDPA systems
TCP-based data flows generate packets and ACKs in two directions, be it in the wireline or wireless networks. In the latter case, packets are typically found in the downlink where...
Tijani Chahed, Eitan Altman, Salah-Eddine Elayoubi
POPL
2010
ACM
15 years 10 months ago
From Program Verification to Program Synthesis
This paper describes a novel technique for the synthesis of imperative programs. Automated program synthesis has the potential to make programming and the design of systems easier...
Saurabh Srivastava, Sumit Gulwani, Jeffrey S. Fost...
DAGSTUHL
2007
15 years 1 months ago
Assisting age related capabilities by ambient technology to prevent functional decline
The elderly is characterized by age related capabilities and handicaps. Whereas age related capabilities like plasticity and adaptability on changing living conditions can lead to ...
Mehmet Gövercin, Richard Willmann, Gerd Lanfe...