Sciweavers

880 search results - page 92 / 176
» Model checking erlang programs: the functional approach
Sort
View
CN
2004
109views more  CN 2004»
15 years 4 months ago
Architectures and protocols for mobile computing applications: a reconfigurable approach
This work deals with reconfigurable control functions and protocols for supporting mobile computing applications in heterogeneous wireless systems like cellular networks and WLANs...
Carla-Fabiana Chiasserini, Francesca Cuomo, Leonar...
WOA
2010
15 years 2 months ago
MERCURIO: An Interaction-oriented Framework for Designing, Verifying and Programming Multi-Agent Systems
Abstract. This is a position paper reporting the motivations, the starting point and the guidelines that characterise the MERCURIO5 project proposal, submitted to MIUR PRIN 20096 ....
Matteo Baldoni, Cristina Baroglio, Federico Bergen...
116
Voted
FSKD
2006
Springer
203views Fuzzy Logic» more  FSKD 2006»
15 years 7 months ago
An Interval Semi-absolute Deviation Model For Portfolio Selection
Interval number is a kind of special fuzzy number and the interval approach is a good method to deal with some uncertainty. The semi-absolute deviation risk function is extended to...
Yong Fang, Shouyang Wang
POPL
2008
ACM
16 years 4 months ago
Relevance heuristics for program analysis
Relevance heuristics allow us to tailor a program analysis to a particular property to be verified. This in turn makes it possible to improve the precision of the analysis where n...
Kenneth L. McMillan
USS
2004
15 years 5 months ago
TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection
Buffer overflow exploits make use of the treatment of strings in C as character arrays rather than as first-class objects. Manipulation of arrays as pointers and primitive pointer...
Kumar Avijit, Prateek Gupta, Deepak Gupta