Sciweavers

2517 search results - page 470 / 504
» Specifying Weak Sets
Sort
View
CASES
2009
ACM
14 years 1 months ago
A platform for developing adaptable multicore applications
Computer systems are resource constrained. Application adaptation is a useful way to optimize system resource usage while satisfying the application performance constraints. Previ...
Dan Fay, Li Shang, Dirk Grunwald
ICAIL
2009
ACM
14 years 1 months ago
Reasoning with spatial plans on the semantic web
ct Land use regulations are an important but often underrated legal domain. Especially in densely populated regions such as the Netherlands, spatial plans have a profound impact on...
Rinke Hoekstra, Radboud Winkels, Erik Hupkes
ASM
2010
ASM
14 years 1 months ago
Using Event-B to Verify the Kmelia Components and Their Assemblies
and formal model, named Kmelia [1,2], with an associated language to specify components, their provided and required services and their assemblies; we also developed a framework na...
Pascal André, Gilles Ardourel, Christian At...
ABIALS
2008
Springer
14 years 1 months ago
The Cognitive Body: From Dynamic Modulation to Anticipation
Abstract— Starting from the situated and embodied perspective on the study of biological cognition as a source of inspiration, this paper programmatically outlines a path towards...
Alberto Montebelli, Robert Lowe, Tom Ziemke
ICMCS
2007
IEEE
104views Multimedia» more  ICMCS 2007»
14 years 1 months ago
A Perception-based Scalable Encryption Model for AVS Audio
Audio Video coding Standard (AVS) is China’s secondgeneration source coding/decoding standard with fully Intellectual Properties. As the sixth part of AVS standard, AVSDRM aims ...
Lan Juan, Huang Tie-Jun, Qu Jun-Hua