Sciweavers

506 search results - page 57 / 102
» Where Is the Value in a Program Verifier
Sort
View
SDL
2001
110views Hardware» more  SDL 2001»
15 years 1 months ago
Timed Extensions for SDL
In this paper we propose some extensions necessary to enable the speci cation and description language SDL to become an appropriate formalism for the design of real-time and embedd...
Marius Bozga, Susanne Graf, Laurent Mounier, Iulia...
89
Voted
WSC
2004
15 years 1 months ago
A Near Optimal Approach to Quality of Service Data Replication Scheduling
This paper describes an approach to real-time decisionmaking for quality of service based scheduling of distributed asynchronous data replication. The proposed approach addresses ...
Kevin Adams, Denis Gracanin, Dusan Teodorovic
100
Voted
JUCS
2008
117views more  JUCS 2008»
15 years 15 days ago
Eliminating Cycles in Weak Tables
: Weak References constitute an elegant mechanism for an application to interact with its garbage collector. In most of its typical uses, weak references are used through weak tabl...
Alexandra Barros, Roberto Ierusalimschy
86
Voted
IJACTAICIT
2010
160views more  IJACTAICIT 2010»
14 years 9 months ago
Concentric Circular Array Antenna Null Steering Synthesis by Using Modified Hybrid Ant Colony System Algorithm
In this article, a hybrid optimization method has been proposed consisting of modified ant colony systems (ACSs) and constrained nonlinear programming (NLP) to solve the problems ...
Ali Abdulhadi Noaman
110
Voted
VMCAI
2004
Springer
15 years 5 months ago
Applying Jlint to Space Exploration Software
Abstract. Java is a very successful programming language which is also becoming widespread in embedded systems, where software correctness is critical. Jlint is a simple but highly...
Cyrille Artho, Klaus Havelund