Sciweavers

278 search results - page 29 / 56
» A Framework for Counterexample Generation and Exploration
Sort
View
CCS
2008
ACM
13 years 10 months ago
VEP: a virtual machine for extended proof-carrying code
One of the key issues with the practical applicability of Proof-Carrying Code (PCC) and its related methods is the difficulty in communicating the proofs which are inherently larg...
Heidar Pirzadeh, Danny Dubé
ICCAD
2001
IEEE
184views Hardware» more  ICCAD 2001»
14 years 5 months ago
CALiBeR: A Software Pipelining Algorithm for Clustered Embedded VLIW Processors
In this paper we describe a software pipelining framework, CALiBeR (Cluster Aware Load Balancing Retiming Algorithm), suitable for compilers targeting clustered embedded VLIW proc...
Cagdas Akturan, Margarida F. Jacome
ER
2009
Springer
130views Database» more  ER 2009»
14 years 3 months ago
Designing Law-Compliant Software Requirements
New laws, such as HIPAA and SOX, are increasingly impacting the design of software systems, as business organisations strive to comply. This paper studies the problem of generating...
Alberto Siena, John Mylopoulos, Anna Perini, Angel...
IWANN
2009
Springer
14 years 3 months ago
TEMMAS: The Electricity Market Multi-Agent Simulator
—This paper describes a multi-agent based simulation (MABS) framework to construct an artificial electric power market populated with learning agents. The artificial market, na...
Paulo Trigo, Paulo Marques, Helder Coelho
AI
2004
Springer
14 years 1 months ago
Constraint Satisfaction Methods for Information Personalization
Constraints formalize the dependencies in a physical world in terms of a logical relation among several unknowns. Constraint satisfaction methods allow efficient navigation of larg...
Syed Sibte Raza Abidi, Yong Han Chong