Sciweavers

276 search results - page 28 / 56
» Constraint Propagation as a Proof System
Sort
View
RE
2010
Springer
13 years 2 months ago
Risk-based Confidentiality Requirements Specification for Outsourced IT Systems
Today, companies are required to be in control of their IT assets, and to provide proof of this in the form of independent IT audit reports. However, many companies have outsourced...
Ayse Morali, Roel Wieringa
SASO
2007
IEEE
14 years 1 months ago
Root Cause Isolation for Self Healing in J2EE Environments
— The increasing complexity of distributed enterprise systems has made the task of managing these systems difficult and time consuming. The only way to simplify the management p...
Umesh Bellur, Amar Agrawal
FMCAD
2007
Springer
14 years 1 months ago
Global Optimization of Compositional Systems
—Embedded systems typically consist of a composition of a set of hardware and software IP modules. Each module is heavily optimized by itself. However, when these modules are com...
Fadi A. Zaraket, John Pape, Adnan Aziz, Margarida ...
SAT
2009
Springer
91views Hardware» more  SAT 2009»
14 years 2 months ago
VARSAT: Integrating Novel Probabilistic Inference Techniques with DPLL Search
Probabilistic inference techniques can be used to estimate variable bias, or the proportion of solutions to a given SAT problem that fix a variable positively or negatively. Metho...
Eric I. Hsu, Sheila A. McIlraith
CP
2009
Springer
14 years 8 months ago
Filtering Numerical CSPs Using Well-Constrained Subsystems
When interval methods handle systems of equations over the reals, two main types of filtering/contraction algorithms are used to reduce the search space. When the system is well-co...
Ignacio Araya, Gilles Trombettoni, Bertrand Neveu