Sciweavers

626 search results - page 59 / 126
» When Can Formal Methods Make a Real Difference
Sort
View
119
Voted
TPDS
2008
176views more  TPDS 2008»
15 years 3 months ago
Adaptive Data Collection Strategies for Lifetime-Constrained Wireless Sensor Networks
Communication is a primary source of energy consumption in wireless sensor networks. Due to resource constraints, the sensor nodes may not have enough energy to report every readin...
Xueyan Tang, Jianliang Xu
237
Voted
NFM
2011
306views Formal Methods» more  NFM 2011»
14 years 10 months ago
Generalized Rabin(1) Synthesis with Applications to Robust System Synthesis
Synthesis of finite-state machines from linear-time temporal logic (LTL) formulas is an important formal specification debugging technique for reactive systems and can quickly ge...
Rüdiger Ehlers
INFOCOM
2010
IEEE
15 years 1 months ago
Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks
—Generating a secret key between two parties by extracting the shared randomness in the wireless fading channel is an emerging area of research. Previous works focus mainly on si...
Kai Zeng, Daniel Wu, An Chan, Prasant Mohapatra
141
Voted
NIPS
2000
15 years 4 months ago
Feature Correspondence: A Markov Chain Monte Carlo Approach
When trying to recover 3D structure from a set of images, the most di cult problem is establishing the correspondence between the measurements. Most existing approaches assume tha...
Frank Dellaert, Steven M. Seitz, Sebastian Thrun, ...
ISSRE
2010
IEEE
15 years 1 months ago
Is Data Privacy Always Good for Software Testing?
—Database-centric applications (DCAs) are common in enterprise computing, and they use nontrivial databases. Testing of DCAs is increasingly outsourced to test centers in order t...
Mark Grechanik, Christoph Csallner, Chen Fu, Qing ...