Sciweavers

950 search results - page 161 / 190
» Modified global k
Sort
View
TSE
2010
110views more  TSE 2010»
13 years 8 months ago
Proofs from Tests
We present an algorithm Dash to check if a program P satisfies a safety property ϕ. The unique feature of the algorithm is that it uses only test generation operations, and nes ...
Nels E. Beckman, Aditya V. Nori, Sriram K. Rajaman...
FSTTCS
2010
Springer
13 years 7 months ago
Model checking time-constrained scenario-based specifications
We consider the problem of model checking message-passing systems with real-time requirements. As behavioural specifications, we use message sequence charts (MSCs) annotated with ...
S. Akshay, Paul Gastin, Madhavan Mukund, K. Naraya...
HIS
2009
13 years 7 months ago
On Some Properties of the lbest Topology in Particle Swarm Optimization
: Particle Swarm Optimization (PSO) is arguably one of the most popular nature- inspired algorithms for real parameter optimization at present. The existing theoretical research on...
Sayan Ghosh, Debarati Kundu, Kaushik Suresh, Swaga...
CCR
2010
152views more  CCR 2010»
13 years 7 months ago
CYBEX: the cybersecurity information exchange framework (x.1500)
The cybersecurity information exchange framework, known as CYBEX, is currently undergoing its first iteration of standardization efforts within ITU-T. The framework describes how ...
Anthony M. Rutkowski, Youki Kadobayashi, Inette Fu...
CDC
2010
IEEE
150views Control Systems» more  CDC 2010»
13 years 4 months ago
Consensus on asynchronous communication networks in presence of external input
This paper presents a class of multi-agent systems where the state of each agent is driven by its own local protocol, and by exogenous time-varying input signal. These inputs may r...
C. Pilotto, K. M. Chandy, J. White