Sciweavers

1939 search results - page 68 / 388
» Dynamic Lex Constraints
Sort
View
ICRA
2010
IEEE
100views Robotics» more  ICRA 2010»
13 years 8 months ago
Weighted barrier functions for computation of force distributions with friction cone constraints
— We present a novel Weighted Barrier Function (WBF) method of efficiently computing optimal grasping force distributions for multifingered hands. Second-order conic friction c...
Per Henrik Borgstrom, Maxim A. Batalin, Gaurav S. ...
ECOOPW
1997
Springer
14 years 1 months ago
Semantics Through Pictures
An object-oriented (OO) model has a static component, the set of allowable snapshots or system states, and a dynamic component, the set of filmstrips or sequences of snapshots. Dia...
Stuart Kent, Ali Hamie, John Howse, Franco Civello...
EUROMICRO
2003
IEEE
14 years 3 months ago
Enforcing a lips Usage Policy for CORBA Components
Software components promise easy reuse, dependability, and simplified development. Problems arise when implicit assumptions about the use of the component are encoded in the imple...
Wayne DePrince Jr., Christine Hofmeister
SEW
2003
IEEE
14 years 2 months ago
Instrumentation of Intermediate Code for Runtime Verification
Runtime monitoring is aimed at ensuring correct runtime behavior with respect to specified constraints. It provides assurance that properties are maintained during a given program...
Ann Q. Gates, Oscar Mondragon, Mary Payne, Steve R...
CP
2009
Springer
14 years 10 months ago
Confidence-Based Work Stealing in Parallel Constraint Programming
The most popular architecture for parallel search is work stealing: threads that have run out of work (nodes to be searched) steal from threads that still have work. Work stealing ...
Geoffrey Chu, Christian Schulte, Peter J. Stuckey