Sciweavers

728 search results - page 120 / 146
» Bargaining with incomplete information
Sort
View
ACSD
2010
IEEE
222views Hardware» more  ACSD 2010»
13 years 5 months ago
Efficient Model Checking of PSL Safety Properties
Abstract--Safety properties are an important class of properties as in the industrial use of model checking a large majority of the properties to be checked are safety properties. ...
Tuomas Launiainen, Keijo Heljanko, Tommi A. Juntti...
IAT
2010
IEEE
13 years 5 months ago
Using Negotiation to Reduce Redundant Autonomous Mobile Program Movements
Distributed load managers exhibit thrashing where tasks are repeatedly moved between locations due to incomplete global load information. This paper shows that systems of Autonomou...
Natalia Chechina, Peter King, Phil Trinder
EJWCN
2010
122views more  EJWCN 2010»
13 years 2 months ago
Using Model Checking for Analyzing Distributed Power Control Problems
Model checking (MC) is a formal verification technique which has known and still knows a resounding success in the computer science community. Realizing that the distributed power...
Thomas Brihaye, Marc Jungers, Samson Lasaulce, Nic...

Publication
237views
12 years 9 months ago
Estimation of behavioral user state based on eye gaze and head pose—application in an e-learning environment
Most e-learning environments which utilize user feedback or profiles, collect such information based on questionnaires, resulting very often in incomplete answers, and sometimes de...
Stylianos Asteriadis, Paraskevi Tzouveli, Kostas K...
ISSTA
2012
ACM
11 years 10 months ago
Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities
Use-after-free vulnerabilities are rapidly growing in popularity, especially for exploiting web browsers. Use-afterfree (and double-free) vulnerabilities are caused by a program o...
Juan Caballero, Gustavo Grieco, Mark Marron, Anton...