Sciweavers

1222 search results - page 170 / 245
» Verifying a File System Implementation
Sort
View
ACTA
2005
104views more  ACTA 2005»
15 years 2 months ago
Subtyping for session types in the pi calculus
Extending the pi calculus with the session types proposed by Honda et al. allows high-level specifications of structured patterns of communication, such as client-server protocols,...
Simon J. Gay, Malcolm Hole
CCE
2007
15 years 2 months ago
Performance monitoring of industrial controllers based on the predictability of controller behavior
This study focuses on performance assessment of industrial controllers. A methodology based on the concept of the predictability of controller errors is proposed for performance m...
Rachid A. Ghraizi, Ernesto Martínez, C&eacu...
IPAW
2010
15 years 11 days ago
The Provenance of Workflow Upgrades
Provenance has become an increasingly important part of documenting, verifying, and reproducing scientific research, but as users seek to extend or share results, it may be imprac...
David Koop, Carlos Eduardo Scheidegger, Juliana Fr...
PIMRC
2010
IEEE
15 years 10 days ago
On the detection probability of parallel code phase search algorithms in GPS receivers
The first stage of the signal processing chain in a Global Positioning System (GPS) receiver is the acquisition, which provides for a desired satellite coarse code phase and Dopple...
Bernhard Geiger, Michael Soudan, Christian Vogel
AMAST
2010
Springer
14 years 9 months ago
Proving Termination Properties with mu-term
mu-term is a tool which can be used to verify a number of termination properties of (variants of) Term Rewriting Systems (TRSs): termination of rewriting, termination of innermost ...
Beatriz Alarcón, Raúl Gutiérr...