Sciweavers

132 search results - page 12 / 27
» Ellipsoidal Techniques for Reachability Analysis
Sort
View
DAC
2000
ACM
14 years 9 months ago
To split or to conjoin: the question in image computation
Image computation is the key step in fixpoint computations that are extensively used in model checking. Two techniques have been used for this step: one based on conjunction of the...
In-Ho Moon, James H. Kukula, Kavita Ravi, Fabio So...
FMSD
1998
77views more  FMSD 1998»
13 years 8 months ago
An Analysis of Bitstate Hashing
The bitstate hashing, or supertrace, technique was introduced in 1987 as a method to increase the quality of verification by reachability analyses for applications that defeat anal...
Gerard J. Holzmann
IPMI
2007
Springer
14 years 9 months ago
A Fuzzy, Nonparametric Segmentation Framework for DTI and MRI Analysis
This paper presents a novel statistical fuzzy-segmentation method for diffusion tensor (DT) images and magnetic resonance (MR) images. Typical fuzzy-segmentation schemes, e.g. thos...
Suyash P. Awate, James C. Gee
IWMM
2000
Springer
113views Hardware» more  IWMM 2000»
14 years 14 hour ago
On the Effectiveness of GC in Java
We study the effectiveness of garbage collection (GC) algorithms by measuring the time difference between the actual collection time of an object and the potential earliest collec...
Ran Shaham, Elliot K. Kolodner, Shmuel Sagiv
APN
1999
Springer
14 years 22 days ago
Structural Methods to Improve the Symbolic Analysis of Petri Nets
Abstract. Symbolic techniques based on BDDs (Binary Decision Diagrams) have emerged as an e cient strategy for the analysis of Petri nets. The existing techniques for the symbolic ...
Enric Pastor, Jordi Cortadella, Marco A. Peñ...