Sciweavers

1415 search results - page 224 / 283
» Verified systems by composition from verified components
Sort
View
ICWN
2008
13 years 9 months ago
A Framework of Authentic Post-Issuance Program Modification for Multi-Application Smart Cards
Authentic program modification is very important for a multi-application smart card system since applications in the system are realized after the issuance of the smart card. In t...
Mohammad Mesbah Uddin, Salahuddin Muhammad Salim Z...
AIPS
2003
13 years 9 months ago
A Framework for Planning in Continuous-time Stochastic Domains
We propose a framework for policy generation in continuoustime stochastic domains with concurrent actions and events of uncertain duration. We make no assumptions regarding the co...
Håkan L. S. Younes, David J. Musliner, Reid ...
ISCAPDCS
2004
13 years 9 months ago
A New Multicast Queuing Mechanism for High-Speed Packet Switches
Increasing multimedia applications such as teleconferencing and video-on-demand require the Internet to effectively provide high-performance multicast support. One of the promisin...
Min Song, Sachin Shetty, Mansoor Alam, HouJun Yang
CDC
2009
IEEE
217views Control Systems» more  CDC 2009»
13 years 9 months ago
Discrete invasive weed optimization algorithm: application to cooperative multiple task assignment of UAVs
This paper presents a novel discrete population based stochastic optimization algorithm inspired from weed colonization. Its performance in a discrete benchmark, timecost trade-off...
Mohsen Ramezani Ghalenoei, Hossein Hajimirsadeghi,...
ASWEC
2010
IEEE
13 years 8 months ago
Non-Monotonic Model Completion in Web Application Engineering
—Formal models are often used to verify systems and prove their correctness, and ensure that transformed models remain consistent to the original system. However, formal techniqu...
Jevon M. Wright, Jens Dietrich