Sciweavers

16 search results - page 2 / 4
» Symbolic Approaches for Finding Control Strategies in Boolea...
Sort
View
DATE
1998
IEEE
103views Hardware» more  DATE 1998»
13 years 11 months ago
Efficient Encoding Schemes for Symbolic Analysis of Petri Nets
Petri nets are a graph-based formalism appropriate to model concurrentsystems such as asynchronouscircuits or network protocols. Symbolic techniques based on Binary Decision Diagr...
Enric Pastor, Jordi Cortadella
PLDI
2010
ACM
14 years 4 months ago
The Reachability-Bound Problem
We define the reachability-bound problem to be the problem of finding a symbolic worst-case bound on the number of times a given control location inside a procedure is visited in ...
Sumit Gulwani, Florian Zuleger
TSP
2008
134views more  TSP 2008»
13 years 6 months ago
Effect of Function Perturbation on the Steady-State Distribution of Genetic Regulatory Networks: Optimal Structural Intervention
Abstract--The dynamics of a rule-based gene regulatory network are determined by the regulatory functions in conjunction with whatever probability distributions are involved in net...
Xiaoning Qian, Edward R. Dougherty
AAAI
2004
13 years 8 months ago
Leap Before You Look: An Effective Strategy in an Oversubscribed Scheduling Problem
Oversubscribed scheduling problems require removing or partially satisfying tasks when enough resources are not available. For a particular oversubscribed problem, Air Force Satel...
Laura Barbulescu, L. Darrell Whitley, Adele E. How...
JSAC
2010
188views more  JSAC 2010»
13 years 1 months ago
Random-walk based approach to detect clone attacks in wireless sensor networks
Abstract--Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, a...
Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqin...