Sciweavers

1805 search results - page 304 / 361
» A Theory of Closure Operators
Sort
View
CEC
2011
IEEE
14 years 4 months ago
Towards human-like social multi-agents with memetic automaton
Abstract—Memetics is a new science that has attracted increasing attentions in the recent decades. Beyond the formalism of simple hybrids, adaptive hybrids and memetic algorithms...
Liang Feng, Yew-Soon Ong, Ah-Hwee Tan, Xianshun Ch...
PODC
2012
ACM
13 years 6 months ago
Brief announcement: a calculus of policy-based routing systems
The BGP (Border Gateway Protocol) is the single inter-domain routing protocol that enables network operators within each autonomous system (AS) to influence routing decisions by ...
Anduo Wang, Carolyn L. Talcott, Alexander J. T. Gu...

Lecture Notes
742views
17 years 2 months ago
Computer Systems Analysis
Comparing systems using measurement, simulation, and queueing models. Common mistakes and how to avoid them, selection of techniques and metrics, art of data presentation, summariz...
Raj Jain
POPL
2009
ACM
16 years 4 months ago
Compositional shape analysis by means of bi-abduction
This paper describes a compositional shape analysis, where each procedure is analyzed independently of its callers. The analysis uses an abstract domain based on a restricted frag...
Cristiano Calcagno, Dino Distefano, Peter W. O'Hea...
PODC
2009
ACM
16 years 4 months ago
Brief announcement: minimum spanning trees and cone-based topology control
Consider a setting where nodes can vary their transmission power thereby changing the network topology, the goal of topology control is to reduce the transmission power while ensu...
Alejandro Cornejo, Nancy A. Lynch