Sciweavers

24105 search results - page 4653 / 4821
» Models in Information Retrieval
Sort
View
129
Voted
EMSOFT
2006
Springer
15 years 7 months ago
Time-triggered implementations of dynamic controllers
Bridging the gap between model-based design and platformbased implementation is one of the critical challenges for embedded software systems. In the context of embedded control sy...
Truong Nghiem, George J. Pappas, Rajeev Alur, Anto...
148
Voted
WSC
2007
15 years 5 months ago
New greedy myopic and existing asymptotic sequential selection procedures: preliminary empirical results
Statistical selection procedures can identify the best of a finite set of alternatives, where “best” is defined in terms of the unknown expected value of each alternative’...
Stephen E. Chick, Jürgen Branke, Christian Sc...
133
Voted
COCO
2010
Springer
149views Algorithms» more  COCO 2010»
15 years 5 months ago
Trade-Off Lower Bounds for Stack Machines
—A space bounded Stack Machine is a regular Turing Machine with a read-only input tape, several space bounded read-write work tapes, and an unbounded stack. Stack Machines with a...
Matei David, Periklis A. Papakonstantinou
ATAL
2008
Springer
15 years 5 months ago
Pan-supplier stock control in a virtual warehouse
We describe the commercial application of agents to the handling of catalogue and stock-control for the selling of books on the internet. The primary characteristic of the target ...
Emad El-Deen El-Akehal, Julian A. Padget
139
Voted
CCS
2008
ACM
15 years 5 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
« Prev « First page 4653 / 4821 Last » Next »