Sciweavers

2513 search results - page 416 / 503
» Tamper-Tolerant Software: Modeling and Implementation
Sort
View
ISCA
2006
IEEE
144views Hardware» more  ISCA 2006»
13 years 11 months ago
Conditional Memory Ordering
Conventional relaxed memory ordering techniques follow a proactive model: at a synchronization point, a processor makes its own updates to memory available to other processors by ...
Christoph von Praun, Harold W. Cain, Jong-Deok Cho...
JOT
2008
142views more  JOT 2008»
13 years 11 months ago
cmUML - A UML based Framework for Formal Specification of Concurrent, Reactive Systems
Complex software systems possess concurrent and reactive behaviors requiring precise specifications prior to development. Lamport's transition axiom method is a formal specif...
Jagadish Suryadevara, Lawrence Chung, R. K. Shyama...
FMSD
2007
110views more  FMSD 2007»
13 years 11 months ago
Exploiting interleaving semantics in symbolic state-space generation
Symbolic techniques based on Binary Decision Diagrams (BDDs) are widely employed for reasoning about temporal properties of hardware circuits and synchronous controllers. However, ...
Gianfranco Ciardo, Gerald Lüttgen, Andrew S. ...
KI
2002
Springer
13 years 10 months ago
Advantages, Opportunities and Limits of Empirical Evaluations: Evaluating Adaptive Systems
While empirical evaluations are a common research method in some areas of Artificial Intelligence (AI), others still neglect this approach. This article outlines both the opportun...
Stephan Weibelzahl, Gerhard Weber
IJRR
2011
159views more  IJRR 2011»
13 years 6 months ago
Visual-inertial navigation, mapping and localization: A scalable real-time causal approach
We present a model to estimate motion from monocular visual and inertial measurements. We analyze the model and characterize the conditions under which its state is observable, an...
Eagle Jones, Stefano Soatto