Sciweavers

953 search results - page 50 / 191
» Constraint Based Transformation Theory
Sort
View
DAC
2003
ACM
15 years 2 days ago
An IDF-based trace transformation method for communication refinement
In the Artemis project [13], design space exploration of embedded systems is provided by modeling application behavior and architectural performance constraints separately. Mappin...
Andy D. Pimentel, Cagkan Erbas
TACAS
2009
Springer
144views Algorithms» more  TACAS 2009»
14 years 3 months ago
Computing Optimized Representations for Non-convex Polyhedra by Detection and Removal of Redundant Linear Constraints
Abstract. We present a method which computes optimized representations for non-convex polyhedra. Our method detects so-called redundant linear constraints in these representations ...
Christoph Scholl, Stefan Disch, Florian Pigorsch, ...
IROS
2009
IEEE
185views Robotics» more  IROS 2009»
14 years 5 months ago
Constraint task-based control in industrial settings
Abstract— Direct physical human-robot interaction has become a central part in the research field of robotics today. To use the advantages of the potential for humans and robots...
Claus Lenz, Markus Rickert, Giorgio Panin, Alois K...
ATAL
2007
Springer
14 years 5 months ago
Constraint satisfaction algorithms for graphical games
We formulate the problem of computing equilibria in multiplayer games represented by arbitrary undirected graphs as a constraint satisfaction problem and present two algorithms. T...
Vishal Soni, Satinder P. Singh, Michael P. Wellman
SACMAT
2003
ACM
14 years 4 months ago
Dependencies and separation of duty constraints in GTRBAC
A Generalized Temporal Role Based Access Control (GTRBAC) model that captures an exhaustive set of temporal constraint needs for access control has recently been proposed. GTRBAC...
James Joshi, Basit Shafiq, Arif Ghafoor, Elisa Ber...