Computer and information sciences topic list of research papers
-
Exploiting Partial Symmetries for Markov Chain Aggregation
Abstract The technique presented in this paper allows the automatic construction of a lumped Markov chain for almost symmetrical Stochastic Well-formed Net (SWN) models. The starting point is the Extended Symbolic Reachability Graph (ESRG), which is ...
2005 / L. Capra, C. Dutheillet, G. Franceschinis, J-M. Ilié -
Preface
Abstract Semantics preservation between source and target program is the commonly accepted minimum requirement to be ensured by compilers. It is the key term compiler verification and optimization are centered around. The precise meaning, however,...
2005 / Knoop Jens, Zimmermann Wolf -
Balancing supply and demand under bilateral constraints2012 / Olivier Bochet, Rahmi İlkılıç, Hervé Moulin, Jay Sethuraman
-
Adjunction Models For Call-By-Push-Value With Stacks
Abstract Call-by-push-value (CBPV) is a new paradigm, which has been claimed to provide the semantic primitives from which call-by-value and call-by-name are built. We present its operational semantics in the form of a Felleisen-Friedman style...
2004 / Paul Blain Levy -
Some Lessons from Using Static Analysis and Software Model Checking for Bug Finding
Abstract This paper describes our experiences in using static analysis and model checking to find errors in three case studies.
2005 / Madanlal Musuvathi, Dawson Engler -
Soft component adaptation1 1This work has been partly supported by the project NAPOLI funded by the Italian Ministry of Instruction, University and Research (MIUR), and the projects TIC2002-4309-C02-02 and TIC2001-2705-C03-02 funded by the Spanish Ministry of Science and Technology (MCYT)
Abstract Component adaptation is widely recognised to be one of the crucial problems in Component-Based Software Engineering (CBSE). We present here a formal methodology for the soft adaptation of components presenting mismatching interaction...
2004 / Antonio Brogi, Carlos Canal, Ernesto Pimentel -
Fully Symbolic Model Checking of Timed Systems using Difference Decision Diagrams1 1This work was carried out while the authors were at the Department of Information Technology, Technical University of Denmark, and was finnancially supported by a grant from the Danish Technical Research Council.
Abstract Current approaches for analyzing timed systems are based on an explicit enumeration of the discrete states and thus these techniques are only capable of analyzing systems with a handful of timers and a few thousand states. We address this...
2004 / Jesper Møller, Jakob Lichtenberg, Henrik R. Andersen, Henrik Hulgaard -
A Low-Level Analysis Library for Architecture Recovery
Abstract We discuss low-level program analyses that are reusable in many high-level analyses for architecture recovery. They include both program structure analyses known from compiler front-ends and data-flow analyses. In general, high-level...
2004 / Welf Löwe, Jonas Lundberg -
A Hierarchical Program Representation for Refactoring
Abstract Currently there is a lot of interest in graph representations of software systems, as they provide a natural and flexible means to describe complex structures. The various visual sublanguages of the UML are perhaps the most obvious example...
2004 / Niels Van Eetvelde, Dirk Janssens -
Preface
Abstract This part of the volume contains the papers accepted for presentation, as well as the extended abstract of the invited lecture by Madhav Marathe (Los Alamos National Laboratory, USA), at the Workshop on Algorithmic MeThods and Models for...
2005 / Dorothea Wagner -
A Type System for Context-dependent Overloading
Abstract This article presents a type system for context-dependent overloading, based on the notion of constrained types. These are types constrained by the definition of functions or constants of given types. This notion supports both overloading...
2005 / Carlos Camarão, Lucília Figueiredo -
Enforcing policies with privacy guardians
Abstract Reasoning about privacy in electronic environments populated with privacy-concerned agents that exchange personal data requires control of ownership and proving the right of possession of a piece of data. The privacy policy expressed by an...
2004 / Radu Serban, Reind van de Riet -
Specifying and verifying reactive systems in a multi-language environment1 1Work partially supported by the project TOSCA.
Abstract The multi-language environment Synchronie supports the design and formal verification of synchronous reactive systems. It integrates three synchronous languages and also three ways to specify properties: the temporal logic ...
2004 / Agathe Merceron, Monica Müllerburg, G.Michele Pinna -
Metamodeling Techniques Applied to the Design of Reconfigurable Control Applications2008 / Luca Ferrarini, Giuseppe Fogliazza, Giulia Mirandola, Carlo Veber
-
The Use of Subtitling in Teaching Professional Interpretation
Abstract Two studies of the General Direction for Education and Culture of the European Commission, one of 2008 and the other of 2011, recommend the use of subtitling both to encourage learning foreign languages and as a tool for formal learning of...
2015 / Mihaela Visky -
High Performance Static Analysis for Industry
Abstract Static source code analysis for software bug detection has come a long way since its early beginnings as a compiler technology. However, with the introduction of more sophisticated algorithmic techniques, such as model checking and...
2012 / Mark Bradley, Franck Cassez, Ansgar Fehnker, Thomas Given-Wilson, Ralf Huuck -
Behavioral Modeling of Software Intensive System Architectures
Abstract Architectural modeling and analysis are mechanisms that allow the capture of design decisions early in the process, so that they can be assessed and modified without incurring the costs of incorrect implementations. This paper addresses...
2013 / Monica Farah-Stapleton, Mikhail Auguston -
Robust Object Tracking Via Class Aware Partial Least Squares-gabor Wavelet Subspace
Abstract Effective tracking is still a big challenge due to lack of robust descriptors which captures discriminative features in non-controlled environment. We propose a novel descriptor based on Gabor wavelet and Partial Least Squares (PLS)...
2013 / K. Selvakumar, Jovitha Jerome -
User Profile and Multi-criteria Decision Making: Personalization of Traveller's Information in Public Transportation
Abstract Personalization plays an important role in information systems. It is an effective solution for reducing complexity when searching information. In this way, the user feels like the system was developed for him/her. In this context,...
2013 / Soumaya Moussa, Makram Soui, Mourad Abed -
An Approach for Pervasive Homecare Environments Focused on Care of Patients with Dementia
Abstract The aging population and the consequent increase in the incidence of dementias is causing many challenges to health systems, mainly related to infrastructure, like low service quality and high costs. As a solution, the homecare is been...
2014 / Ederson Bastiani, Giovani R. Librelotto, Leandro O. Freitas, Rafael Pereira, Miguel B. Brasil