Sciweavers

3146 search results - page 467 / 630
» Efficient Consequence Finding
Sort
View
129
Voted
CAV
2006
Springer
116views Hardware» more  CAV 2006»
15 years 7 months ago
Lazy Shape Analysis
Abstract. Many software model checkers are based on predicate abstraction. If the verification goal depends on pointer structures, the approach does not work well, because it is di...
Dirk Beyer, Thomas A. Henzinger, Grégory Th...
109
Voted
CIA
2006
Springer
15 years 7 months ago
Coverage Density as a Dominant Property of Large-Scale Sensor Networks
Large-scale sensor networks are becoming more present in our life then ever. Such an environment could be a cellular network, an array of fire detection sensors, an array of solar ...
Osher Yadgar, Sarit Kraus
105
Voted
CIA
2006
Springer
15 years 7 months ago
Egalitarian Allocations of Indivisible Resources: Theory and Computation
We present a mechanism for collaboration and coordination amongst agents in multi-agent societies seeking social equity. This mechanism allows to compute egalitarian allocations of...
Paul-Amaury Matt, Francesca Toni
117
Voted
CIKM
2006
Springer
15 years 7 months ago
Classification spanning correlated data streams
In many applications, classifiers need to be built based on multiple related data streams. For example, stock streams and news streams are related, where the classification patter...
Yabo Xu, Ke Wang, Ada Wai-Chee Fu, Rong She, Jian ...
141
Voted
CONEXT
2006
ACM
15 years 7 months ago
Early application identification
The automatic detection of applications associated with network traffic is an essential step for network security and traffic engineering. Unfortunately, simple port-based classif...
Laurent Bernaille, Renata Teixeira, Kavé Sa...