Sciweavers

1021 search results - page 85 / 205
» Concepts in Proof Planning
Sort
View
INFOCOM
2008
IEEE
14 years 3 months ago
A Novel On-Demand Framework for Collaborative Object Detection in Sensor Networks
In this report, we will provide the detailed theoretical analysis including some omitted proofs in our latest submission to Infocom 2008. For more details about the framework prot...
Guanqun Yang, Vinod Shukla, Daji Qiao
ASWEC
2007
IEEE
14 years 3 months ago
Timed Behavior Trees and Their Application to Verifying Real-Time Systems
Behavior Trees (BTs) are a graphical notation used for formalising functional requirements and have been successfully applied to several case studies. However, the notation curren...
Lars Grunske, Kirsten Winter, Robert Colvin
ICTAI
2007
IEEE
14 years 3 months ago
CompoNet: Programmatically Embedding Neural Networks into AI Applications as Software Components
The provision of embedding neural networks into software applications can enable variety of Artificial Intelligence systems for individual users as well as organizations. Previous...
Uzair Ahmad, Andrey Gavrilov, Sungyoung Lee, Young...
IPPS
2007
IEEE
14 years 3 months ago
Using Rewriting Logic to Match Patterns of Instructions from a Compiler Intermediate Form to Coarse-Grained Processing Elements
This paper presents a new and retargetable method to identify patterns of instructions with direct support in coarsegrained processing elements (PEs). The method uses a three-addr...
Carlos Morra, João M. P. Cardoso, Jürg...
SEFM
2007
IEEE
14 years 3 months ago
Verifying Security Properties of Cryptoprotocols: A Novel Approach
We model security protocols as a game tree using concepts of game semantics. Using this model we ascribe semantics to protocols written in the standard simple arrow notation. Acco...
Mohamed Saleh, Mourad Debbabi