Results 11  20
of
34,127
A theory of timed automata
, 1999
"... Model checking is emerging as a practical tool for automated debugging of complex reactive systems such as embedded controllers and network protocols (see [23] for a survey). Traditional techniques for model checking do not admit an explicit modeling of time, and are thus, unsuitable for analysis of ..."
Abstract

Cited by 2651 (32 self)
 Add to MetaCart
of realtime systems whose correctness depends on relative magnitudes of different delays. Consequently, timed automata [7] were introduced as a formal notation to model the behavior of realtime systems. Its definition provides a simple way to annotate statetransition graphs with timing constraints
VERY HIGH RESOLUTION INTERPOLATED CLIMATE SURFACES FOR GLOBAL LAND AREAS
, 2005
"... We developed interpolated climate surfaces for global land areas (excluding Antarctica) at a spatial resolution of 30 arc s (often referred to as 1km spatial resolution). The climate elements considered were monthly precipitation and mean, minimum, and maximum temperature. Input data were gathered ..."
Abstract

Cited by 553 (8 self)
 Add to MetaCart
from a variety of sources and, where possible, were restricted to records from the 1950–2000 period. We used the thinplate smoothing spline algorithm implemented in the ANUSPLIN package for interpolation, using latitude, longitude, and elevation as independent variables. We quantified uncertainty
Dynamic Bayesian Networks: Representation, Inference and Learning
, 2002
"... Modelling sequential data is important in many areas of science and engineering. Hidden Markov models (HMMs) and Kalman filter models (KFMs) are popular for this because they are simple and flexible. For example, HMMs have been used for speech recognition and biosequence analysis, and KFMs have bee ..."
Abstract

Cited by 770 (3 self)
 Add to MetaCart
been used for problems ranging from tracking planes and missiles to predicting the economy. However, HMMs
and KFMs are limited in their “expressive power”. Dynamic Bayesian Networks (DBNs) generalize HMMs by allowing the state space to be represented in factored form, instead of as a single discrete
Climate and atmospheric history of the past 420,000 years from the Vostok ice core,
 Antarctica. Nature
, 1999
"... Antarctica has allowed the extension of the ice record of atmospheric composition and climate to the past four glacialinterglacial cycles. The succession of changes through each climate cycle and termination was similar, and atmospheric and climate properties oscillated between stable bounds. Inte ..."
Abstract

Cited by 716 (15 self)
 Add to MetaCart
sea sediments, continental deposits of flora, fauna and loess, and ice cores. These studies have documented the wide range of climate variability on Earth. They have shown that much of the variability occurs with periodicities corresponding to that of the precession, obliquity and eccentricity
Motivation through the Design of Work: Test of a Theory. Organizational Behavior and Human Performance,
, 1976
"... A model is proposed that specifies the conditions under which individuals will become internally motivated to perform effectively on their jobs. The model focuses on the interaction among three classes of variables: (a) the psychological states of employees that must be present for internally motiv ..."
Abstract

Cited by 622 (2 self)
 Add to MetaCart
A model is proposed that specifies the conditions under which individuals will become internally motivated to perform effectively on their jobs. The model focuses on the interaction among three classes of variables: (a) the psychological states of employees that must be present for internally
The inductive approach to verifying cryptographic protocols
 Journal of Computer Security
, 1998
"... Informal arguments that cryptographic protocols are secure can be made rigorous using inductive definitions. The approach is based on ordinary predicate calculus and copes with infinitestate systems. Proofs are generated using Isabelle/HOL. The human effort required to analyze a protocol can be as ..."
Abstract

Cited by 480 (29 self)
 Add to MetaCart
Informal arguments that cryptographic protocols are secure can be made rigorous using inductive definitions. The approach is based on ordinary predicate calculus and copes with infinitestate systems. Proofs are generated using Isabelle/HOL. The human effort required to analyze a protocol can
Hybrid Automata: An Algorithmic Approach to the Specification and Verification of Hybrid Systems
, 1992
"... We introduce the framework of hybrid automata as a model and specification language for hybrid systems. Hybrid automata can be viewed as a generalization of timed automata, in which the behavior of variables is governed in each state by a set of differential equations. We show that many of the examp ..."
Abstract

Cited by 460 (20 self)
 Add to MetaCart
We introduce the framework of hybrid automata as a model and specification language for hybrid systems. Hybrid automata can be viewed as a generalization of timed automata, in which the behavior of variables is governed in each state by a set of differential equations. We show that many
formulation with state variable evolution
"... A stabilized, mixed nite element formulation for modelling viscoplastic ow, which can be used to model approximately steadystate metalforming processes, is presented. The mixed formulation is expressed in terms of the velocity, pressure and state variable elds, where the state variable is used to ..."
Abstract
 Add to MetaCart
A stabilized, mixed nite element formulation for modelling viscoplastic ow, which can be used to model approximately steadystate metalforming processes, is presented. The mixed formulation is expressed in terms of the velocity, pressure and state variable elds, where the state variable is used
Extending FF to Numerical State Variables
 In Proceedings of the 15th European Conference on Artificial Intelligence
, 2002
"... The FF system obtains a heuristic estimate for each state during a forward search by solving a relaxed version of the planning task, where the relaxation is to assume that all delete lists are empty. We show how this relaxation, and FF's heuristic function, can naturally be extended to plann ..."
Abstract

Cited by 41 (2 self)
 Add to MetaCart
to planning tasks with constraints and effects on numerical state variables. First results show that the implementation, MetricFF, is competitive with other approaches to numerical planning, performing well against one of the most recent approaches on a numerical version of the Logistics domain.
The Determinants of Credit Spread Changes.
 Journal of Finance
, 2001
"... ABSTRACT Using dealer's quotes and transactions prices on straight industrial bonds, we investigate the determinants of credit spread changes. Variables that should in theory determine credit spread changes have rather limited explanatory power. Further, the residuals from this regression are ..."
Abstract

Cited by 422 (2 self)
 Add to MetaCart
write CS(t) = CS(V t , r t , {X t }), where V is firm value, r is the spot rate, and {X t } represents all of the other "state variables" needed to specify the model. 6 Since credit spreads are uniquely determined given the current values of the state variables, it follows that credit spread
Results 11  20
of
34,127