Sciweavers

577 search results - page 101 / 116
» Model Checking Based on Simultaneous Reachability Analysis
Sort
View
POPL
2012
ACM
12 years 5 months ago
Playing in the grey area of proofs
Interpolation is an important technique in verification and static analysis of programs. In particular, interpolants extracted from proofs of various properties are used in invar...
Krystof Hoder, Laura Kovács, Andrei Voronko...
PEWASUN
2007
ACM
13 years 11 months ago
Worst-case lifetime computation of a wireless sensor network by model-checking
Wireless Sensor Network (WSN) technology is now mature enough to be used in numerous application domains. However, due to the restricted amount of energy usually allocated to each...
Laurent Mounier, Ludovic Samper, Wassim Znaidi
ICASSP
2008
IEEE
14 years 4 months ago
Insights into the stable recovery of sparse solutions in overcomplete representations using network information theory
In this paper, we examine the problem of overcomplete representations and provide new insights into the problem of stable recovery of sparse solutions in noisy environments. We es...
Yuzhe Jin, Bhaskar D. Rao
MUE
2007
IEEE
111views Multimedia» more  MUE 2007»
14 years 4 months ago
Securing the Pharmaceutical Supply Chain using RFID
RFID technology has been applied to a number of applications. In [5], a protocol was described how to apply RFID to currency to provide integrity (e.g. reduce counterfeiting) whil...
Brian King, Xiaolan Zhang 0003
PEWASUN
2004
ACM
14 years 3 months ago
A performance evaluation framework for IEEE 802.11 ad-hoc networks
Interferences in an ad-hoc network can be defined as a set of constraints that specify which groups of nodes cannot transmit simultaneously, and they have significant implications...
Ping Chung Ng, Soung Chang Liew, Li Bin Jiang