Sciweavers

1963 search results - page 259 / 393
» Applications of Preferences using Answer Set Programming
Sort
View
114
Voted
PLDI
2010
ACM
15 years 11 months ago
Type-preserving Compilation for End-to-end Verification of Security Enforcement
A number of programming languages use rich type systems to verify security properties of code. Some of these languages are meant for source programming, but programs written in th...
Juan Chen, Ravi Chugh, Nikhil Swamy
MUC
1992
15 years 6 months ago
GE NLToolset: description of the system as used for MUC-4
The GE NLTooLsET is a set of text interpretation tools designed to be easily adapted to new domains. This report summarizes the system and its performance on the MUG-4 task . INTR...
George B. Krupka, Paul S. Jacobs, Lisa F. Rau, Loi...
115
Voted
SEKE
2009
Springer
15 years 8 months ago
Extending AOP to Support Broad Runtime Monitoring Needs
Abstract—Runtime monitoring, where some part of a program’s behavior and/or data is observed during execution, is a very useful technique that software developers to use for un...
Amjad Nusayr, Jonathan Cook
112
Voted
ICRA
2003
IEEE
135views Robotics» more  ICRA 2003»
15 years 7 months ago
Robodaemon -a device independent, network-oriented, modular mobile robot controller
Abstract— We discuss a software environment for multirobot, multi-platform mobile robot control and simulation. Like others, we have observed that mobile robotics research is gre...
Gregory Dudek, Robert Sim
110
Voted
WCET
2010
15 years 1 days ago
Precomputing Memory Locations for Parametric Allocations
Current worst-case execution time (WCET) analyses do not support programs using dynamic memory allocation. This is mainly due to the unpredictability of cache performance introduc...
Jörg Herter, Sebastian Altmeyer