Sciweavers

114 search results - page 15 / 23
» Symbolic Simulation: An ACL2 Approach
Sort
View
VTC
2006
IEEE
14 years 1 months ago
Using Unclaimed Sub-Carriers in Opportunistic OFDMA Systems
Abstract— In this paper, we consider the unclaimed subcarriers that no user feeds back in an opportunistic OFDMA system with a per sub-carrier power constraint. Unclaimed subcarr...
Patrick Svedman, Leonard J. Cimini Jr., Björn...
SIGSOFT
2007
ACM
14 years 8 months ago
State space exploration using feedback constraint generation and Monte-Carlo sampling
The systematic exploration of the space of all the behaviours of a software system forms the basis of numerous approaches to verification. However, existing approaches face many c...
Sriram Sankaranarayanan, Richard M. Chang, Guofei ...
MICCAI
2005
Springer
14 years 8 months ago
A Method to Evaluate Human Spatial Coordination Interfaces for Computer-Assisted Surgery
Computer assistance for breast conserving surgery requires a guidance method to assist a surgeon in locating tumor margin accurately. A wide array of guidance methods can be consid...
Michel-Alexandre Cardin, Jian-Xiong Wang, Donald B...
DATE
2003
IEEE
108views Hardware» more  DATE 2003»
14 years 20 days ago
Generalized Posynomial Performance Modeling
This paper presents a new method to automatically generate posynomial symbolic expressions for the performance characteristics of analog integrated circuits. The coefficient set ...
Tom Eeckelaert, Walter Daems, Georges G. E. Gielen...
RAS
2008
84views more  RAS 2008»
13 years 6 months ago
Monitoring the execution of robot plans using semantic knowledge
Even the best laid plans can fail, and robot plans executed in real world domains tend to do so often. The ability of a robot to reliably monitor the execution of plans and detect...
Abdelbaki Bouguerra, Lars Karlsson, Alessandro Saf...