Sciweavers

1898 search results - page 356 / 380
» Weak Keys for IDEA
Sort
View
IASTEDSEA
2004
13 years 10 months ago
Higher-order strategic programming: A road to software assurance
Program transformation through the repeated application of simple rewrite rules is conducive to formal verification. In practice, program transformation oftentimes requires data t...
Victor L. Winter, Steve Roach, Fares Fraij
IASTEDSEA
2004
13 years 10 months ago
Engineering long-lived applications using MDA
Creating long-lived software systems requires a technology to build systems with good maintainability. One of the core ideas of the Model Driven Architecture (MDA) is to ease the ...
Tilman Seifert, Gerd Beneken, Niko Baehr
USENIX
2001
13 years 10 months ago
A Waypoint Service Approach to Connect Heterogeneous Internet Address Spaces
The rapid growth of the Internet has made IP addresses a scarce resource. To get around this problem, today and in the foreseeable future, networks will be deployed with reusable-...
T. S. Eugene Ng, Ion Stoica, Hui Zhang
DAGSTUHL
1998
13 years 10 months ago
Markov Localization for Reliable Robot Navigation and People Detection
Localization is one of the fundamental problems in mobile robotics. Without knowledge about their position mobile robots cannot e ciently carry out their tasks. In this paper we pr...
Dieter Fox, Wolfram Burgard, Sebastian Thrun
AAAI
1994
13 years 10 months ago
Solution Reuse in Dynamic Constraint Satisfaction Problems
Many AI problems can be modeled as constraint satisfaction problems (CSP), but many of them are actually dynamic: the set of constraints to consider evolves because of the environ...
Gérard Verfaillie, Thomas Schiex