Sciweavers

12264 search results - page 2187 / 2453
» Analysis of the rubberband algorithm
Sort
View
FMCAD
2000
Springer
15 years 8 months ago
Automated Refinement Checking for Asynchronous Processes
Abstract. We consider the problem of refinement checking for asynchronous processes where refinement corresponds to stutter-closed language inclusion. Since an efficient algorithmi...
Rajeev Alur, Radu Grosu, Bow-Yaw Wang
FMCAD
2000
Springer
15 years 8 months ago
Scalable Distributed On-the-Fly Symbolic Model Checking
Abstract. This paper presents a scalable method for parallel symbolic on-the-fly model checking in a distributed memory environment. Our method combines a scheme for on-the-fly mod...
Shoham Ben-David, Tamir Heyman, Orna Grumberg, Ass...
137
Voted
FOSAD
2000
Springer
15 years 8 months ago
Security Goals: Packet Trajectories and Strand Spaces
This material was presented in a series of lectures at fosad, a summer school on Foundations of Security Analysis and Design, at the University of Bologna Center at Bertinoro in Se...
Joshua D. Guttman
HYBRID
2000
Springer
15 years 8 months ago
A Dynamic Bayesian Network Approach to Tracking Using Learned Switching Dynamic Models
Abstract. Switching linear dynamic systems (SLDS) attempt to describe a complex nonlinear dynamic system with a succession of linear models indexed by a switching variable. Unfortu...
Vladimir Pavlovic, James M. Rehg, Tat-Jen Cham
ICALP
2000
Springer
15 years 8 months ago
A Bound on the Capacity of Backoff and Acknowledgement-Based Protocols
We study contention-resolution protocols for multiple-access channels. We show that every backoff protocol is transient if the arrival rate, , is at least 0.42 and that the capaci...
Leslie Ann Goldberg, Mark Jerrum, Sampath Kannan, ...
« Prev « First page 2187 / 2453 Last » Next »