Sciweavers

1963 search results - page 259 / 393
» Applications of Preferences using Answer Set Programming
Sort
View
PLDI
2010
ACM
14 years 6 months ago
Type-preserving Compilation for End-to-end Verification of Security Enforcement
A number of programming languages use rich type systems to verify security properties of code. Some of these languages are meant for source programming, but programs written in th...
Juan Chen, Ravi Chugh, Nikhil Swamy
MUC
1992
14 years 1 months ago
GE NLToolset: description of the system as used for MUC-4
The GE NLTooLsET is a set of text interpretation tools designed to be easily adapted to new domains. This report summarizes the system and its performance on the MUG-4 task . INTR...
George B. Krupka, Paul S. Jacobs, Lisa F. Rau, Loi...
SEKE
2009
Springer
14 years 3 months ago
Extending AOP to Support Broad Runtime Monitoring Needs
Abstract—Runtime monitoring, where some part of a program’s behavior and/or data is observed during execution, is a very useful technique that software developers to use for un...
Amjad Nusayr, Jonathan Cook
ICRA
2003
IEEE
135views Robotics» more  ICRA 2003»
14 years 2 months ago
Robodaemon -a device independent, network-oriented, modular mobile robot controller
Abstract— We discuss a software environment for multirobot, multi-platform mobile robot control and simulation. Like others, we have observed that mobile robotics research is gre...
Gregory Dudek, Robert Sim
WCET
2010
13 years 6 months ago
Precomputing Memory Locations for Parametric Allocations
Current worst-case execution time (WCET) analyses do not support programs using dynamic memory allocation. This is mainly due to the unpredictability of cache performance introduc...
Jörg Herter, Sebastian Altmeyer