Sciweavers

2451 search results - page 425 / 491
» The Octagon Abstract Domain
Sort
View
132
Voted
GLOBECOM
2009
IEEE
15 years 1 months ago
Measurements of Multicast Service Discovery in a Campus Wireless Network
Abstract--Applications using multicast service discovery protocols, such as iTunes, have become increasingly popular. However, multicast service discovery protocols generate signif...
Se Gi Hong, Suman Srinivasan, Henning Schulzrinne
151
Voted
ICAIL
2009
ACM
15 years 1 months ago
Case law in extended argumentation frameworks
In this paper we discuss how recent developments in argumentation frameworks, most notably Extended Argumentation Frameworks, can inform the representation of a body of case law u...
Trevor J. M. Bench-Capon, Sanjay Modgil
139
Voted
ICRA
2009
IEEE
196views Robotics» more  ICRA 2009»
15 years 1 months ago
CHOMP: Gradient optimization techniques for efficient motion planning
Abstract-- Existing high-dimensional motion planning algorithms are simultaneously overpowered and underpowered. In domains sparsely populated by obstacles, the heuristics used by ...
Nathan D. Ratliff, Matt Zucker, J. Andrew Bagnell,...
127
Voted
ICSE
2009
IEEE-ACM
15 years 1 months ago
Extended eTVRA vs. security checklist: Experiences in a value-web
Abstract--Security evaluation according to ISO 15408 (Common Criteria) is a resource and time demanding activity, as well as being costly. For this reason, only few companies take ...
Ayse Morali, Emmanuele Zambon, Siv Hilde Houmb, Ka...
162
Voted
ICST
2009
IEEE
15 years 1 months ago
Proving Functional Equivalence of Two AES Implementations Using Bounded Model Checking
Bounded model checking--as well as symbolic equivalence checking--are highly successful techniques in the hardware domain. Recently, bit-vector bounded model checkers like CBMC ha...
Hendrik Post, Carsten Sinz