# Research Publications

 Search | Show all All Narrow your search « 1 2 ... 4 5 6 7 8 ... 49 50 »Results per Page 10 25 50 100 2504931 result(s) By TypeConference Paper (3163)Journal Publication (1104)Book Chapter (166)Poster Presentation (113)Technical Report (89)By Year2013 (229)2012 (638)2011 (642)2010 (724)2009 (713)By Research GroupControl and Signal Processing (489)Software Systems (317)Machine Learning (293)Optimisation (271)Computer Vision (262)Optics and Nano Electronics (228)Networks (224)Implant Systems (1) Yiran Xie, Nianjun Liu, Nick BarnesThis paper presents a novel phosphene visualization of depth and boundary computed by Associative Markov Random Fields under low resolution. Unlike conventional methods modeling the depth and boundary as an individual MRF respectively, our algorithm ...The 34th Annual International Conference of the Engineering in Medicine and Biology Society - August 2012 Nick Barnes, Xuming He, Chris McCarthy, Lachlan Horne, Junae Kim, Adele Scott, Paulette LiebyProsthetic vision provides vision which is reduced in resolution and dynamic range compared to normal human vision. This comes about both due to residual damage to the visual system from the condition that caused vision loss, and due to limitations of...IEEE International Conference on Engineering in Medicine & Biology (EMBC) - August 2012 Andreas Schutt, Thibaut Feydy, Peter Stuckey, Mark G. WallaceWe present a generic exact method for minimizing the project duration of the resource-constrained project scheduling problem with generalized precedence relations (Rcpsp/max). This is a very general scheduling model with applications areas such as project...Journal of Scheduling - August 2012 Lachlan Horne, Nick Barnes, Chris McCarthy, Xuming HeCurrent and near-term implantable prosthetic vision systems offer the potential to restore some visual function, but suffer from poor resolution and dynamic range of induced phosphenes. This can make it difficult for users of prosthetic vision systems ...IEEE International Conference on Engineering in Medicine & Biology (EMBC) - August 2012 Adrian BishopThe problem of recursive estimation and model validation for linear discrete-time systems with partial prior information is examined. More specifically, an underlying linear discrete-time system is considered where the statistics of the driving noise is ...8th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes - August 2012 Mustafa Hashmi, Guido Governatori, Moe Thandar WynnMost approaches to business process compliance are restricted to the analysis of the structure of processes. It has been argued that full regulatory compliance requires information on not only the structure of processes but also on what the tasks...The 6th International Symposium on Rules (RuleML 2012) - August 2012 Song Wang, Yi Li, Nick BarnesRetinal diseases are leading causes of severe vision loss and blindness throughout the world. Visual prosthetics has been demonstrated to be an effective therapy to partially restore vision. Reading is one of the most important functional abilities ...IEEE International Conference on Engineering in Medicine & Biology (EMBC) - August 2012 Yi Li, Chris McCarthy, Nick BarnesWe propose to use Just Noticeable Difference (JND) as the principle in visualizing results for image processing modules for prosthetic vision. Current Bionic Eye hardware implants have limited levels of separately perceivable brightness (i.e., low ...IEEE International Conference on Engineering in Medicine & Biology (EMBC) - August 2012 Andreas Bauer, Ylies FalconeUsers wanting to monitor distributed or component-based systems often perceive them as monolithic systems which, seen from the outside, exhibit a uniform behaviour as opposed to many components displaying many local behaviours that together constitute ...18th International Symposium on Formal Methods (FM) - August 2012 Jonathan Guerin, Steve Glass, Peizhao Hu, Wee Lum Tan, Marius PortmannThis paper presents a practical and low-cost approach to estimate the maximum achievable wireless link bandwidth based on the prevailing link conditions in an IEEE 802.11 network. This approach works by observing the number of bits successfully delivered...The 8th International Wireless Communications and Mobile Computing Conference - August 2012 Jinbo HuangEmpirical data from recent work has indicated that SAT-based solvers can outperform native search-based solvers on certain classes of problems in qualitative temporal reasoning, particularly for the Interval Algebra (IA). In the present work, we show that...European Conference on Artificial Intelligence (ECAI) - August 2012 Jinbo HuangRecent work has shown that SAT can be theoretically more powerful than heuristic search provided the heuristic used by search is implemented as a set of clauses on which unit propagation simulates the evaluation of the heuristic. The $h^{\max}$ heuristic ...European Conference on Artificial Intelligence (ECAI) - August 2012 Brian Lam, Guido Governatori, Ken Satoh, Hiroshi HosobeSpeculative Computation is an effective means for solving problems with incomplete information in an open and distributed environment, such as peer-to-peer environment. It allows such a system to compute tentative (and possibly final) solutions using ...Computational Logic and Multi Agent Systems, CLIMA XIII - August 2012 Pascal Van Hentenryck, Nabeel Gillani, Carleton Coffrin This paper studies the joint damage assessment and recovery of the power infrastructure after a natural disaster has occurred. Earlier work in this area proposed an optimization algorithm for the recovery phase, assuming that the infrastructure ...European Conference on Artificial Intelligence (ECAI) - August 2012 Thao Duong, Nghia Pham, Abdul SattarStochastic local search for satisfiability (SAT) has successfully been applied to solve a wide range of problems. However, it still suffers from a major shortcoming, i.e. being trapped in local minima. In this study, we explore different heuristics to ...European Conference on Artificial Intelligence (ECAI) - August 2012 Leonid Antsfeld, Toby WalshWe present a new algorithm to find optimal routes in a multi-modal public transportation network. This work is an extension of recent work on finding multi-criteria optimal paths in multi-modal public transportation networks \cite{antsfeld2012} using ...AILOG - August 2012 Abdelberi Chaabane, Dali Kaafar, Roksana BoreliIn this paper, we examine web user tracking capabilities of the three major global Online Social Networks (OSNs). We study the mechanisms which enable these services to persistently and accurately follow users web activity, and evaluate to which extent ...ACM SIGCOMM Workshop on Online Social Networks (WOSN) - August 2012 Guido Governatori, Sidney ShekIn this paper we report on the development and evaluation of a business process compliance checker, based on the compliance-by-design methodology proposed by Governatori and Sadiq6th International Rule Challenge @ RuleML 2012 - August 2012 Len Bass, Robert NordThis paper analyzes several industrial software architecture evaluation methods from the perspective of their contextual elements. Contextual elements include the time available for the evaluation, the personnel available, the openness of the results, the...WICSA/ECSA 2012 - August 2012 Nina Narodytska, Toby Walsh, Lirong XiaWe propose a simple method for combining together voting rules that performs a run-off between the different winners of each voting rule. We prove that this combinator has several good properties. For instance, even if just one of the base voting rules ...European Conference on Artificial Intelligence (ECAI) - August 2012 M. Lees, R. Ellen, M. Steffens, P. Brodie, Iven Mareels, Rob EvansICSP 2012 : International Conference on Signal Processing - August 2012 We describe a research program on design techniques to enable the cost-effective construction of trustworthy systems. The focus is on single-machine systems that can be formally verified to provide desired system-wide security and safety properties. Such ...IEEE/IFIP Working Conference on Software Architecture (WICSA) - August 2012 Liang Zhao, Sherif Sakr, Liming Zhu, Xiwei (Sherry) Xu, Anna LiuScaling relational database in the cloud is one of the critical factors in the migration of applications to the cloud. It is important that applications can directly monitor fine-grained scaling performance (such as replication delays, query-specific ...Proceedings of the WICSA/ECSA 2012 Companion Volume - August 2012 Miguel Martinez-Prieto, Javier D. Fernandez, Rodrigo CanovasApplied Computing Review (ACR) - August 2012 Matt Thompson, Jason Tangen, Duncan J. McCarthyFingerprint experts have testified in criminal courts for over a century, but there have been few scientific investigations of the human capacity to discriminate these patterns. Here we present results from the first tightly controlled experiment of ...6th European Academy of Forensic Science Conference - August 2012 This paper provides some requirements for the data management portion of a knowledge discovery ecosystem platform. The requirements are functional – what the platform should provide for its clients; quality – how the platform should support modifiability,...Architectures and Platforms for Knowledge Discovery from Data - August 2012 Hamish Meffin, Alex Hadjinicolaou, Ronald Leung, David Garrett, Kumaravelu Ganesan, Kate Fox, David Nyagam , Mohit Shivdasani , Michael Ibbotson, Steven Prawer , Brendan O’Brian Biomaterials - August 2012 Terence Chen, Dali Kaafar, Arik Friedman, Roksana BoreliWe present an empirical study of personal information revealed in public profiles of people who use multiple Online Social Networks (OSNs). We first consider the number of publicly available attributes in such profiles based on various demographics and ...ACM Workshop on Online Social Networks (WOSN) - August 2012 M. Halpern, David NgInternational Conference of the IEEE Engineering in Medicine and Biology Society (EMBC) - August 2012 Alex E. Hadjinicolaou , Ronald T Leung, David J. Garrett, Hamish Meffin, Kumaravelu Ganesan, Kate Fox, David Nayagam, Mohit Shivdasani, Michael Ibbotson, Steven Prawer, Brendan O'BrienBiomaterials - August 2012 Peter HöfnerColoring algebra (CA) captures common ideas of feature oriented programming (FOP), a general programming paradigm that provides formalisms, methods, languages, and tools for building maintainable, customisable, as well as extensible software. FOP has ...Workshop on Lattices and Relations - August 2012 Peter HöfnerIn the past, algebraic techniques based on semirings have been used describe shortest path algorithms and routing procedures. These approaches often use matrices over semirings/Kleene algebra, which form again a semiring/Kleene algebra. While these ...Workshop on Lattices and Relations - August 2012 Youmna Borghol, Sebastien Ardon, Niklas Carlsson, Derek Eager, Anirban MahantiVideo dissemination through sites such as YouTube can have widespread impacts on opinions, thoughts, and cultures. Not all videos will reach the same popularity and have the same impact. Popularity differences arise not only because of differences in ...ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD) - August 2012 Before low-level imperative code can be reasoned about in an interactive theorem prover, it must first be converted into a logical representation in that theorem prover. Accurate translations of such code should be conservative, choosing safe ...Interactive Theorem Proving 2012 - August 2012 Gerwin Klein, Rafal Kolanski, Andrew BoytonWe present an Isabelle/HOL library with a generic type class implementation of separation algebra, develop basic separation logic concepts on top of it, and implement generic automated tactic support that can be used directly for any instantiation of...Interactive Theorem Proving (ITP) - August 2012 Kar Wai Lim, Scott Sanner, Shengbo GuoIt has been previously noted that optimization of the ncall@k relevance objective (i.e., a set-based objective that is 1 if at least n documents in a set of k are relevant, otherwise 0) encourages more result set diversification for smaller n, but ...SIGIR 2012 - August 2012 Robert van GlabbeekThis paper proposes a definition of what it means for one system description language to encode another one, thereby enabling an ordering of system description languages with respect to expressive power. I compare the proposed definition with other ...Combined 19th International Workshop on Expressiveness in Concurrency and 9th Workshop on Structural Operational Semantics - August 2012 Kanchana Thilakarathna, Aline Viana, Aruna Seneviratne, Lars (Henrik) PetanderWe focus on dissemination of content for delay tolerant applications/services, (i.e. content sharing, advertisement propagation, etc.) where users are geographically clustered into communities. Due to emerging security and privacy related issues, majority...INRIA - August 2012 Behnam Sedighi, Trong Anh Huynh, Stan SkafidasMidwest Symposium on Circuits and Systems (MWCAS) 2012 - August 2012 Hanna SuominenSTT data gathering and advisory board meeting - August 2012 The aim of AOARD project #FA2386-12-1-4022 (“Formal System Verification - Extension 2”, running from 9 February 2012 to 8 August 2012) is to provide an initial framework prototype for efficiently performing formal proofs of targeted security or safety ...NICTA - August 2012 Ahmed Awad, Sherif SakrBusiness processes are central to the operation of both public and private organizations. With the rapid growth in the number of process models developed by di erent process designers, it becomes crucial for business process designers to be able to look ...Journal of Computers in Industry, Elsevier - August 2012 Nikzad Babaii Rizvandi, Albert Zomaya, Reza Moraveji, Javid TaheriIn this paper, we present an approach to model and predict the total CPU utilization –in terms of CPU clock tick– of MapReduce applications for almost fixed-sized input data. Our approach has two key phases: profiling and modelling. In the profiling phase...International Conference on Algorithms and aAchitectures for Parallel Processing (ICA3PP) - August 2012 Reza Moraveji, Javid Taheri, MohammadReza HosseinyFarahabady, Nikzad Babaii Rizvandi, Albert ZomayaWorkload consolidation, sharing physical resources among multiple workloads, is a promising technique to save cost and energy in cluster computing systems. This paper highlights a few challenges of workload consolidation for Hadoop as one of the current ...IEEE Grid - August 2012 James Cheney, Michael Norrish, René VestergaardAdequacy is an important criterion for judging whether a formalization is suitable for reasoning about the actual object of study. The issue is particularly subtle in the expansive case of approaches to languages with name-binding. In prior work, adequacy...Journal of Automated Reasoning - August 2012 Terence Chen, Dali Kaafar, Arik Friedman, Roksana BoreliThis report presents an empirical study of personal information revealed in public pro- files of people who use multiple Online Social Networks (OSNs). We first consider the number of publicly available attributes in such profiles based on various ...NICTA - August 2012 Behnam Sedighi, Yevgen Borokhovych, Hans Gustat, Christoph ScheyttInternational Microwave Symposium - July 2012 Behnam Sedighi, Christoph Scheytt, Pylyp OstrovskyyInternational Microwave Symposium - July 2012 Behnam Sedighi, Christoph ScheyttInternational Microwave Symposium - July 2012 Joerg Hoffmann, Ingo Weber, Frank Michael KraftJournal of Artificial Intelligence Research (JAIR) - July 2012 Hanna Suominen, David Martinez, Mike Wu, Michelle Ananda-Rajah, Lawrence CavedonIntroduction. We discuss three initiatives from the NICTA eHealth Business Team towards developing ICT techniques for improving healthcare via: 1. capturing more clinical data; 2. converting them to processable information; 3. recording this as ...HIC 2012, Australia’s Health Informatics Conference - July 2012 Birgit Planitz, Leif Hanlen, Hanna SuominenWe reviewed 275 international living laboratories in relation to project and research outcomes. We outline successes and failures for the living lab model, from 33 laboratories, for health and discuss laboratory frameworks that appear more likely to ...Health Informatics Conference - July 2012 Chen Zhu, An Vu Tran, Simin Chen, Liang B. Du, Cuong Do, Trevor Anderson, Arthur J Lowery, Stan SkafidasOptics Express - July 2012 Thivya Kandappu, Vijay Sivaraman, Roksana BoreliWe consider stored content being streamed to a resource poor device (such as a sensor node or a mobile phone), and address the issue of authenticating such content in real-time at the receiver. Per-packet digital signatures incur high computational cost, ...9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks - SECON 2012 - July 2012 Ke (Desmond) Wang, Thas Nirmalathas, Christina Lim, Stan SkafidasIEEE Photonics Journal - July 2012 Peter Lindsay, Kirsten Winter, Sentot KromodimoeljoFor complex engineered systems, it is important to conduct technical risk assessment early in the system development life-cycle, in order to identify critical system requirements, such as safety requirements, that should be included in design. This paper ...Proc 2012 combined conferences Australian Systems Engineering, Test & Evaluation Conference (SETE) and 6th Asia Pacific Conference on Systems Engineering (APCOSE) - July 2012 Jessica Davies, Nina Narodytska, Toby WalshSuccessive elimination of candidates is often a route to making manipulation intractable to compute. We prove that eliminating candidates does not necessarily increase the computational complexity of manipulation. However, for many voting rules used ...Association for the Advancement of Artificial Intelligence (AAAI 2012) - July 2012 Toby WalshSymmetry is an important problem in many combinatorial problems. One way of dealing with symmetry is to add constraints that eliminate symmetric solutions. We survey recent results in this area, focusing especially on two common and useful cases: ...Association for the Advancement of Artificial Intelligence (AAAI 2012) - July 2012 M. Inouye, Tom Conway, Justin Zobel, KE HoltBMC Genomics - July 2012 The common-case IPC handler in microkernels, referred to as the fastpath, is performance-critical and thus is often optimised using hand-written assembly. However, compiler technology has advanced significantly in the past decade, which suggests that we ...Asia-Pacific Workshop on Systems (APSys) - July 2012 Bernard Blackham, Vernon Tang, Gernot HeiserReal-time operating systems (RTOSes) are traditionally designed to be fully preemptible. This improves the average interrupt response time of the system but increases kernel complexity. An alternative design is to make the kernel mostly non-preemptible ...Asia-Pacific Workshop on Systems (APSys) - July 2012 Nghia Pham, Thao Duong, Abdul SattarA key challenge in developing efficient local search solvers is to effectively minimise search stagnation (i.e. avoiding traps or local minima). A majority of the state-of-the-art local search solvers perform random and/or Novelty-based walks to overcome ...The Twenty-Sixth Conference on Artificial Intelligence (AAAI-12) - July 2012 Scott Sanner, Ehsan AbbasnejadProbabilistic reasoning in the real-world often requires inference in continuous variable graphical models, yet there are few methods for \emph{exact, closed-form} inference when joint distributions are non-Gaussian. To address this inferential ...Conference of the Association for the Advancement of Artificial Intelligence - July 2012 Zahra Zamani, Scott SannerMany real-world decision-theoretic planning problems are naturally modeled using both continuous state and action (CSA) spaces, yet little work has provided exact solutions for the case of continuous actions. In this work, we propose a symbolic ...Conference of the Association for the Advancement of Artificial Intelligence - July 2012 Carleton Coffrin, Pascal Van Hentenryck, Russell BentThis paper considers the restoration of multiple interdependent infrastructures after a man-made or natural disaster. Modern infrastructures feature complex cyclic interdependencies and require a holistic restoration process. This paper presents the ...Association for the Advancement of Artificial Intelligence (AAAI) - July 2012 Carleton Coffrin, Pascal Van HentenryckThis paper studies the applicability of the linearized DC model in optimizing power restoration after significant network disruptions. In such circumstances, no AC base-point solution exists and the objective is to maximize the served load. The paper ...IEEE Power and Energy Annual Meeting - July 2012 Carleton Coffrin, Pascal Van HentenryckThis paper studies the applicability of the linearized DC model in optimizing power restoration after significant network disruptions. In such circumstances, no AC base-point solution exists and the objective is to maximize the served load. The paper ...IEEE Power and Energy General Meeting - July 2012 David Hill, T. Liu, G. Verbič2012 IEEE Power & Energy Society General Meeting - July 2012 Sang-Won Lee, Philip F. Markham, Mauricio J. C. Coppo, Alistair R. Legione, John Markham, Amir H. Noormohammadi, Glenn F. Browning, Nino Ficorilli, Carol A. Hartley, Joanne M. DevlinScience - July 2012 Toby WalshConstraints can be exploited in paradigms outside of constraint programming. In particular, powerful global constraints can often be decomposed into small primitives and these decompositions can simulate complex propagation algorithms that perform ...Inductive Logic Programming (revised papers of the 21st International Conference) - July 2012 We describe a pathfinding system based on Jump Point Search (JPS): a recent and very successful search strategy that performs symmetry breaking to speed up optimal pathfinding on grid maps. We first modify JPS for grid maps where corner-cutting moves are ...Fifth Annual Symposium on Combinatorial Search - July 2012 Tom Conway, Jeremy Wazny, Andrew Bromage, Martin Tymms, Dhanya Sooraj, Elizabeth D. Williams, Bryan Beresford-SmithBMC Bioinformatics - July 2012 Guido Governatori, Antonino Rotolo, Erica CalardoDefeasible Deontic Logic is a simple and computationally efficient approach for the representation of normative reasoning. Traditionally defeasible logics are defined proof theoretically based on the proof conditions for the logic. While several logic...Deontic Logic in Computer Science - July 2012 The recent advent of broadband Internet has led to a convergence of the Web, multimedia, and social media technologies, and revolutionized the TV content consumption. It facilitates users not only watching the TV content, but also accessing personalised ...The 20th conference on User Modeling, Adaptation, and Personalization (UMAP-2012) - July 2012 Jeffrey Zhang, Guoqiang Mao, Brian AndersonConsider a wireless multi-hop network where nodes are randomly distributed in a given area following a homogeneous Poisson process. The hop count statistics, viz the probabilities related to the number of hops between two nodes, are important for ...IEEE Transactions on Parallel and Distributed Systems - July 2012 Paul BannermanA common view is that good project management is necessary but not enough to ensure project success. This begs the question: Why not? The paper examines current factor-, process- and capability-based explanations of project performance and finds gaps in ...Project Management Institute (PMI) Research Conference 2012 - July 2012 Mengxi Xu, Shlomo Berkovsky, Irena Koprinska, Sebastien Ardon, Kalina YacefWeb-based catch-up TV services allow users to watch programs at their favoured time and device and are revolutionizing the TV watching habits. With the increasing demand for catch-up TV, it has become evident that there is a need for personalised ...UMAP 2012 Workshop - International Workshop on 2012 TV and multimedia personalization (TVM2P) - July 2012 Jonathan Li, Trevor Anderson, Trefor MorganIEEE Photonics Technology Letters (PTL) - July 2012 Marlon Dumas, Luciano Garcia-Banuelos, Marcello La Rosa, Reina UbaAs organizations reach higher levels of business process management maturity, they often find themselves maintaining very large process model repositories, representing valuable knowledge about their operations. A common practice within these reposito- ...Information Systems - July 2012 M. Ferrer, Horst BunkeImage Processing and Analysing with Graphs: Theory and Practice - July 2012 Minh-dung Tran, Dali Kaafar, Claude castellucciaPersonalized services, especially targeted advertising, are blossoming in the cloud. In targeted (or behavioural) advertising, users' behaviours are tracked over time in order to customize served ads to their interests. This creates serious privacy ...The 12th (PETS 2012) Privacy Enhancing Technologies Symposium - July 2012 Richard Campbell, Karin Klotzbuecher, Adam Kowalczyk, Geoffrey John MacIntyreISMB 2012 - July 2012 Benjamin Goudey, Qiao Wang, Geoffrey John MacIntyre, Michael Inouye, Linda Stern, Adam KowalczykISMB 2012 - July 2012 Benjamin Goudey, Qiao Wang, Fan Shi, Linda Stern, Geoffrey John MacIntyre, Cheng-Soon Ong, Michael Inouye, Adam KowalczykISMB 2012 - July 2012 Mark Bradley, Franck Cassez, Ansgar Fehnker, Thomas Given-Wilson, Ralf Huuck, Maximillian JunkerWe present an industrial strength static analysis tool for automated bug detection in C/C++ source code called GoannaSMT. The underlying technology of GoannaSMT is an automata-based approach to static analysis, where high-level syntactic source code ...Tools for Automatic Program AnalysiS (TAPAS 2012) - July 2012 Benjamin Goudey, Qiao Wang, Fan Shi, Andrew Kowalczyk, Cheng-Soon Ong, Leon Gor, Linda Stern, Michael Inouye, Adam Kowalczyk8th ISCB Student Council Symposium 2012 - July 2012 Sang-Won Lee, Philip F Markham, Mauricio J C Coppo, Alistair R Legione, John Markham, Amir H Noormohammadi, Glenn F Browning, Nino Ficorilli, Carol A Hartley, Joanne M DevlinNature - July 2012 Lan Du, Wray Buntine, Huidong JinTopic models are increasingly being used for text analysis tasks, often times replacing earlier semantic techniques such as latent seman- tic analysis. In this paper, we develop a novel adaptive topic model with the ability to adapt topics from both ...Empirical Methods in Natural Language Processing (EMNLP) - July 2012 Karin Verspoor, Kevin LivingstonThis paper explores how and why the Linguistic Annotation Framework might be adapted for compatibility with recent more general proposals for the representation of annotations in the Semantic Web, referred to here as the Open Annotation models. We argue ...Linguistic Annotation Workshop, LAW VI - July 2012 Jeremy WaznyInternational Society for Computational Biology - July 2012 David Garrett, Kumaravelu Ganesan , Samantha Lichter, Hamish Meffin, Steven Prawer63rd De Beers Diamond Conference 2012 - July 2012 Antonio Robles-Kelly, Prakash SuryaIn this paper we propose a new approach for the comparison and retrieval of geometric graphs formulated from an alignment perspective. The algorithm presented here is quite general in nature and applies to geometric graphs of any dimension. The method ...Pattern Recognition (PR) - July 2012 Ke (Desmond) Wang, Stan Skafidas, Thas Nirmalathas, Christina LimIEEE Photonics Society Summer Topical Meeting - July 2012 In addition to theoretical analysis and simulations, the evaluation of new networking technologies in a real-life context and scale is critical to their global adoption and deployment. Federations of experimental platforms (aka testbeds) offer a ...NICTA - July 2012 Shlomo Berkovsky, Jill Freyne, Oinas-Kukkonen HarriACM Transactions on Intelligent Interactive Systems - July 2012 Franck Cassez, René Rydhof Hansen, Mads OlesenTiming anomalies make worst-case execution time analysis much harder, because the analysis will have to consider all local choices. It has been widely recognised that certain hardware features are timing anomalous, while others are not. However, defining ...12th International Workshop on Worst-Case Execution-Time Analysis (WCET) - July 2012 Peter Hoefner, Bernhard MöllerAround 1960, Dijkstra, Floyd and Warshall published papers on algorithms for solving single-source and all-sources shortest path problems, respectively. These algorithms, nowadays named after their inventors, are well known and well established. This ...Formal Aspects of Computing (FAOC) - July 2012 Timothy Bourke, Matthias Daum, Gerwin Klein, Rafal KolanskiLarge-scale verification projects pose particular challenges. Issues include proof exploration, efficiency of the edit-check cycle, and proof refactoring for documentation and maintainability. We draw on insights from two large-scale verification ...Conferences on Intelligent Computer Mathematics (CICM) / Mathematical Knowledge Management - July 2012 Ashkan Amirsadri, Adrian Bishop, Jonghyuk Kim, Jochen Trumpf, Lars PeterssonThis paper provides a flexible solution to the problem of building and maintaining a very-large-scale map using multiple vehicles. In particular, we consider producing a map on the scale of 1000 kilometres of features in an outdoor environment. The ...International Conference on Information Fusion - July 2012 Sachintha Karunaratne, M. Morelande, Bill MoranInternational Conference on Information Fusion - July 2012