Sciweavers

674 search results - page 36 / 135
» Arguments and Results
Sort
View
SODA
2010
ACM
187views Algorithms» more  SODA 2010»
14 years 5 months ago
An Improved Competitive Algorithm for Reordering Buffer Management
We design and analyze an on-line reordering buffer management algorithm with improved O log k log log k competitive ratio for non-uniform costs, where k is the buffer size. This i...
Noa Avigdor-Elgrabli, Yuval Rabani
CALCO
2007
Springer
100views Mathematics» more  CALCO 2007»
14 years 1 months ago
Applications of Metric Coinduction
Metric coinduction is a form of coinduction that can be used to establish properties of objects constructed as a limit of finite approximations. One can prove a coinduction step s...
Dexter Kozen, Nicholas Ruozzi
FOCS
2006
IEEE
14 years 1 months ago
A Local Switch Markov Chain on Given Degree Graphs with Application in Connectivity of Peer-to-Peer Networks
We study a switch Markov chain on regular graphs, where switches are allowed only between links that are at distance 3; we call this the Flip. The motivation for studying the Flip...
Tomás Feder, Adam Guetz, Milena Mihail, Ami...
HICSS
2010
IEEE
152views Biometrics» more  HICSS 2010»
14 years 12 days ago
Increasing Software Security through Open Source or Closed Source Development? Empirics Suggest that We have Asked the Wrong Que
While many theoretical arguments against or in favor of open source and closed source software development have been presented, the empirical basis for the assessment of arguments...
Guido Schryen, Eliot Rich
ADAEUROPE
2010
Springer
14 years 11 days ago
Practical Limits on Software Dependability: A Case Study
The technology for building dependable computing systems has advanced dramatically. Nevertheless, there is still no complete solution to building software for critical systems in w...
Patrick J. Graydon, John C. Knight, Xiang Yin