Sciweavers

589 search results - page 55 / 118
» Introducing Dynamic Constraints in B
Sort
View
DAC
2006
ACM
14 years 9 months ago
Predicate learning and selective theory deduction for a difference logic solver
Design and verification of systems at the Register-Transfer (RT) or behavioral level require the ability to reason at higher levels of abstraction. Difference logic consists of an...
Chao Wang, Aarti Gupta, Malay K. Ganai
HPCC
2007
Springer
14 years 2 months ago
Stability Aware Routing: Exploiting Transient Route Availability in MANETs
The highly dynamic character of a mobile ad-hoc network (MANET) poses significant challenges on network communications and resource management. Previous work on routing in MANETs ...
Pramita Mitra, Christian Poellabauer, Shivajit Moh...
FOSAD
2009
Springer
14 years 2 months ago
The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols
We introduce the Open-source Fixed-point Model Checker OFMC for symbolic security protocol analysis, which extends the Onthe-fly Model Checker (the previous OFMC). The native inpu...
Sebastian Mödersheim, Luca Viganò
VLDB
2005
ACM
140views Database» more  VLDB 2005»
14 years 1 months ago
Loadstar: Load Shedding in Data Stream Mining
In this demo, we show that intelligent load shedding is essential in achieving optimum results in mining data streams under various resource constraints. The Loadstar system intro...
Yun Chi, Haixun Wang, Philip S. Yu
SIGMOD
2005
ACM
133views Database» more  SIGMOD 2005»
14 years 8 months ago
Constrained Optimalities in Query Personalization
Personalization is a powerful mechanism that helps users to cope with the abundance of information on the Web. Database query personalization achieves this by dynamically construc...
Georgia Koutrika, Yannis E. Ioannidis