Sciweavers

1920 search results - page 130 / 384
» The Range Constraint: Algorithms and Implementation
Sort
View
BIRTHDAY
2007
Springer
15 years 8 months ago
Automating Verification of Cooperation, Control, and Design in Traffic Applications
We present a verification methodology for cooperating traffic agents covering analysis of cooperation strategies, realization of strategies through control, and implementation of c...
Werner Damm, Alfred Mikschl, Jens Oehlerking, Erns...
RTAS
1995
IEEE
15 years 7 months ago
Design and evaluation of a window-consistent replication service
—Real-time applications typically operate under strict timing and dependability constraints. Although traditional data replication protocols provide fault tolerance, real-time gu...
Ashish Mehra, Jennifer Rexford, Hock-Siong Ang, Fa...
EWSN
2006
Springer
16 years 3 months ago
Power Management for Bluetooth Sensor Networks
Low power is a primary concern in the field of wireless sensor networks. Bluetooth has often been labeled as an inappropriate technology in this field due to its high power consump...
Luca Negri, Lothar Thiele
ARCS
2009
Springer
15 years 10 months ago
Evaluating CMPs and Their Memory Architecture
Abstract. Many-core processor architectures require scalable solutions that reflect the locality and power constraints of future generations of technology. This paper presents a CM...
Chris R. Jesshope, Mike Lankamp, Li Zhang
EUROMICRO
1999
IEEE
15 years 8 months ago
Validation of Object Oriented Models using Animation
Experience has shown that prototypingis a valuabletechnique in the validation of designs. However, the prototype(s) can be too far semantically removed from the design. Animation ...
Ian Oliver, Stuart Kent