Sciweavers

252 search results - page 35 / 51
» A Scenario-Based Approach to Protocol Design Using Evolution...
Sort
View
212
Voted
TSE
2012
13 years 5 months ago
Automated Abstractions for Contract Validation
d Abstractions for Contract Validation Guido de Caso, Víctor Braberman, Diego Garbervetsky and Sebastián Uchitel —Pre/post condition-based specifications are common-place in a...
Guido de Caso, Víctor A. Braberman, Diego G...
132
Voted
GECCO
2007
Springer
194views Optimization» more  GECCO 2007»
15 years 9 months ago
Hybrid coevolutionary algorithms vs. SVM algorithms
As a learning method support vector machine is regarded as one of the best classifiers with a strong mathematical foundation. On the other hand, evolutionary computational techniq...
Rui Li, Bir Bhanu, Krzysztof Krawiec
148
Voted
BCS
2008
15 years 5 months ago
Tools for Traceable Security Verification
Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as one of the current grand challenges for computer science. We present work toward...
Jan Jürjens, Yijun Yu, Andreas Bauer 0002
146
Voted
ATAL
2005
Springer
15 years 9 months ago
From concepts to agents: towards a framework for multi-agent system modelling
Whilst tools assist the various tasks required to develop a multi-agent system (MAS), yet there still remains a gap between the generation of MAS models and program code. AUML dev...
Richard Hill, Simon Polovina, Martin D. Beer
152
Voted
CODES
2011
IEEE
14 years 3 months ago
Analysis and optimization of fault-tolerant task scheduling on multiprocessor embedded systems
Reliability is a major requirement for most safety-related systems. To meet this requirement, fault-tolerant techniques such as hardware replication and software re-execution are ...
Jia Huang, Jan Olaf Blech, Andreas Raabe, Christia...