Sciweavers

441 search results - page 22 / 89
» A Method for Proving Observational Equivalence
Sort
View
CCCG
2009
13 years 10 months ago
Inapproximability of the Perimeter Defense Problem
We model the problem of detecting intruders using a set of infrared beams by the perimeter defense problem: given a polygon P, find a minimum set of edges S of the polygon such th...
Evangelos Kranakis, Danny Krizanc, Lata Narayanan,...
SCL
2008
62views more  SCL 2008»
13 years 8 months ago
Nuclearity of Hankel operators for ultradifferentiable control systems
Nuclearity of the Hankel operator is a known sufficient condition for convergence of Lyapunov-balanced truncations. We show how a previous result on nuclearity of Hankel operators...
Mark R. Opmeer
MP
2002
165views more  MP 2002»
13 years 8 months ago
A feasible semismooth asymptotically Newton method for mixed complementarity problems
Semismooth Newton methods constitute a major research area for solving mixed complementarity problems (MCPs). Early research on semismooth Newton methods is mainly on infeasible me...
Defeng Sun, Robert S. Womersley, Houduo Qi
KR
2004
Springer
14 years 2 months ago
A Split-Combination Method for Merging Inconsistent Possibilistic Knowledge Bases
In this paper, a new method for merging multiple inconsistent knowledge bases in the framework of possibilistic logic is presented. We divide the fusion process into two steps: on...
Guilin Qi, Weiru Liu, David H. Glass
ENTCS
2007
153views more  ENTCS 2007»
13 years 8 months ago
The Methods of Approximation and Lifting in Real Computation
The basic motivation behind this work is to tie together various computational complexity classes, whether over different domains such as the naturals or the reals, or whether de...
Manuel Lameiras Campagnolo, Kerry Ojakian