Sciweavers

301 search results - page 50 / 61
» An efficient algorithm to verify generalized false paths
Sort
View
UAI
2004
13 years 8 months ago
Sequential Information Elicitation in Multi-Agent Systems
We introduce the study of sequential information elicitation in strategic multi-agent systems. In an information elicitation setup a center attempts to compute the value of a func...
Rann Smorodinsky, Moshe Tennenholtz
SAC
2008
ACM
13 years 6 months ago
Flexible pointer analysis using assign-fetch graphs
se a new abstraction for pointer analysis that represents reads and writes to memory instead of traditional points-to relations. Compared to points-to graphs, our Assign-Fetch Gra...
Marcio Buss, Daniel Brand, Vugranam C. Sreedhar, S...
BMCBI
2004
323views more  BMCBI 2004»
13 years 7 months ago
Biochemical Network Stochastic Simulator (BioNetS): software for stochastic modeling of biochemical networks
Background: Intrinsic fluctuations due to the stochastic nature of biochemical reactions can have large effects on the response of biochemical networks. This is particularly true ...
David Adalsteinsson, David McMillen, Timothy C. El...
TIT
2008
83views more  TIT 2008»
13 years 7 months ago
Constrained Codes as Networks of Relations
We address the well-known problem of determining the capacity of constrained coding systems. While the onedimensional case is well understood to the extent that there are technique...
Moshe Schwartz, Jehoshua Bruck
KDD
2007
ACM
141views Data Mining» more  KDD 2007»
14 years 7 months ago
Mining favorable facets
The importance of dominance and skyline analysis has been well recognized in multi-criteria decision making applications. Most previous studies assume a fixed order on the attribu...
Raymond Chi-Wing Wong, Jian Pei, Ada Wai-Chee Fu, ...