Sciweavers

506 search results - page 58 / 102
» Where Is the Value in a Program Verifier
Sort
View
105
Voted
GECCO
2003
Springer
15 years 5 months ago
On Role of Implicit Interaction and Explicit Communications in Emergence of Social Behavior in Continuous Predators-Prey Pursuit
We present the result of our work on use of genetic programming for evolving social behavior of agents situated in inherently cooperative environment. We use predators-prey pursuit...
Ivan Tanev, Katsunori Shimohara
86
Voted
TOOLS
1999
IEEE
15 years 4 months ago
Bounding Component Behavior via Protocols
In this paper we enhance the SOFA Component Description Language with a semantic description of a component's functionality. There are two key requirements this description a...
Frantisek Plasil, Milos Besta, Stanislav Visnovsky
101
Voted
TPHOL
2000
IEEE
15 years 4 months ago
Equational Reasoning via Partial Reflection
We modify the reflection method to enable it to deal with partial functions like division. The idea behind reflection is to program a tactic for a theorem prover not in the impleme...
Herman Geuvers, Freek Wiedijk, Jan Zwanenburg
111
Voted
CCS
2008
ACM
15 years 2 months ago
On the protocol composition logic PCL
A recent development in formal security protocol analysis is the Protocol Composition Logic (PCL). We identify a number of problems with this logic as well as with extensions of t...
Cas J. F. Cremers
CASES
2006
ACM
15 years 6 months ago
Adaptive and flexible dictionary code compression for embedded applications
Dictionary code compression is a technique where long instructions in the memory are replaced with shorter code words used as index in a table to look up the original instructions...
Mats Brorsson, Mikael Collin