نتایج جستجو برای: heuristic behaviors
تعداد نتایج: 181976 فیلتر نتایج به سال:
In system-level designs, since many incremental refinements are applied to the designs, equivalence checking between each refinement should be applied. However, proving whether two concurrent designs are equivalent is a difficult task, not to mention that the concurrent design itself can be error-prone. In this paper, we propose an equivalence checking method for C-based descriptions of systeml...
Nowadays, robots are programmed with a mix of discrete and continuous low level behaviors by experts in a very time consuming and expensive process. Existing automated planning approaches are either based on hybrid model predictive control techniques, which do not scale well due to time discretization, or temporal planners, which sacrifice plan expressivity by only supporting discretized fixed ...
Attacks using vulnerabilities are considered nowadays a severe threat. Thus, a host needs a device that monitors system activities for malicious behaviors and blocks those activities to protect itself. In this paper, we introduce PROcess BEhavior (PROBE), which monitors processes running on a host to identify abnormal process behaviors. PROBE makes a process tree using only process creation rel...
We present low power techniques for mapping arrays in behavioral speci cations to physical memory, speci cally for memory intensive behaviors that exhibit regularity in their memory access patterns. Our approach exploits this regularity in memory accesses by reducing the number of transitions on the memory address bus. We study the impact of di erent strategies for mapping arrays in behaviors t...
Model-based diagnosis of discrete event systems (DESs) is more and more active in artificial intelligence. However, there has been always a very restrictive assumption in the previous works that the model of a given DES is complete, including all nominal behaviors and all possible failure behaviors of the system. In order to relax this so restrictive assumption, in this paper, model-based diagn...
Skid-steer teleoperated robots are commonly used by military and civilian crews to perform high-risk, dangerous and critical tasks such as bomb disposal. Their missions are often performed in unstructured environments with irregular terrain, such as inside collapsed buildings or on rough terrain covered with a variety of media, such as sand, brush, mud, rocks and debris. During such missions, i...
university course timetabling is a complex optimizationproblem. there are many components like departments, faculties, rooms,and students making the problem huge and difficult to solve. eachcomponent enforces a set of normally conflicting constraints on thesolution space. the problem will be solved if courses are scheduled indifferent rooms and within some specific time slots such that a set of...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید