Sciweavers

232 search results - page 33 / 47
» Termination of linear bounded term rewriting systems
Sort
View
IJFCS
2008
158views more  IJFCS 2008»
13 years 7 months ago
An Alternative Construction in Symbolic Reachability Analysis of Second Order Pushdown Systems
Abstract. Recently, it has been shown that for any higher order pushdown system H and for any regular set C of configurations, the set pre H(C), is regular. In this paper, we give ...
Anil Seth
SIGSOFT
2003
ACM
14 years 26 days ago
Fluent model checking for event-based systems
Model checking is an automated technique for verifying that a system satisfies a set of required properties. Such properties are typically expressed as temporal logic formulas, in...
Dimitra Giannakopoulou, Jeff Magee
CDC
2008
IEEE
188views Control Systems» more  CDC 2008»
13 years 9 months ago
A method for stereo-vision based tracking for robotic applications
Vision based tracking of an object using the ideas of perspective projection inherently consists of nonlinearly modelled measurements although the underlying dynamic system that en...
Pubudu N. Pathirana, Adrian N. Bishop, Andrey V. S...
GLOBECOM
2009
IEEE
14 years 2 months ago
On Downlink Network MIMO under a Constrained Backhaul and Imperfect Channel Knowledge
— Next generation mobile communications systems will most likely employ network MIMO in order to mitigate inter-cell interference and improve system fairness and spectral effici...
Patrick Marsch, Gerhard Fettweis
SIGMETRICS
2008
ACM
161views Hardware» more  SIGMETRICS 2008»
13 years 7 months ago
Bound analysis of closed queueing networks with workload burstiness
Burstiness and temporal dependence in service processes are often found in multi-tier architectures and storage devices and must be captured accurately in capacity planning models...
Giuliano Casale, Ningfang Mi, Evgenia Smirni