Sciweavers

622 search results - page 108 / 125
» Answer Set Programming and Bounded Model Checking
Sort
View
TACAS
2005
Springer
124views Algorithms» more  TACAS 2005»
14 years 1 months ago
Localization and Register Sharing for Predicate Abstraction
ion Himanshu Jain1,2 , Franjo Ivanˇci´c1 , Aarti Gupta1 , and Malay K. Ganai1 1 NEC Laboratories America, Inc., 4 Independence Way, Princeton, NJ 08540 2 School of Computer Scien...
Himanshu Jain, Franjo Ivancic, Aarti Gupta, Malay ...
COR
2007
108views more  COR 2007»
13 years 8 months ago
A hub location problem with fully interconnected backbone and access networks
This paper considers the design of two-layered fully interconnected networks.A two-layered network consists of clusters of nodes, each defining an access network and a backbone n...
Tommy Thomadsen, Jesper Larsen
HICSS
1999
IEEE
72views Biometrics» more  HICSS 1999»
14 years 8 days ago
Software Reliability as a Function of User Execution Patterns
Assessing the reliability of a software system has always been an elusive target. A program may work very well for a number of years and this same program may suddenly become quit...
John C. Munson, Sebastian G. Elbaum
IUI
2003
ACM
14 years 1 months ago
Personal choice point: helping users visualize what it means to buy a BMW
How do we know if we can afford a particular purchase? We can find out what the payments might be and check our balances on various accounts, but does this answer the question? Wh...
Andrew E. Fano, Scott W. Kurth
FUIN
2007
130views more  FUIN 2007»
13 years 8 months ago
A Logic-Based Approach to Finding Explanations for Discrepancies in Optimistic Plan Execution
Abstract. Consider an agent executing a plan with nondeterministic actions, in a dynamic environment, which might fail. Suppose that she is given a description of this action domai...
Thomas Eiter, Esra Erdem, Wolfgang Faber, Já...