Sciweavers

535 search results - page 70 / 107
» Checking Computations in Polylogarithmic Time
Sort
View
ISSS
2000
IEEE
109views Hardware» more  ISSS 2000»
14 years 3 days ago
Verification of Embedded Systems using a Petri Net based Representation
The ever increasing complexity of embedded systems consisting of hardware and software components poses a challenge in verifying their correctness, New verification methods that o...
Luis Alejandro Cortés, Petru Eles, Zebo Pen...
IROS
2007
IEEE
87views Robotics» more  IROS 2007»
14 years 2 months ago
Vision-based loop closing for delayed state robot mapping
— This paper shows results on outdoor vision-based loop closing for Simultaneous Localization and Mapping. Our experiments show that for loops of over 50m, the pose estimates mai...
Viorela Ila, Juan Andrade-Cetto, Rafael Valencia, ...
ISORC
2005
IEEE
14 years 1 months ago
RMMC Programming Model and Support Execution Engine in the TMO Programming Scheme
: While the conventional remote method invocation mechanism has been considered for a long time as the primary approach for facilitating interactions among real-time objects, a mul...
K. H. (Kane) Kim, Yuqing Li, Sheng Liu, Moon-hae K...
DSOM
2004
Springer
14 years 1 months ago
A Formal Validation Model for the Netconf Protocol
Netconf is a protocol proposed by the IETF that defines a set of operations for network configuration. One of the main issues of Netconf is to define operations such as validate...
Sylvain Hallé, Rudy Deca, Omar Cherkaoui, R...
EUROPAR
2004
Springer
14 years 1 months ago
More Legal Transformations for Locality
Abstract. Program transformations are one of the most valuable compiler techniques to improve data locality. However, restructuring compilers have a hard time coping with data depe...
Cédric Bastoul, Paul Feautrier