Sciweavers

1466 search results - page 127 / 294
» Completeness of the Authentication Tests
Sort
View
INFORMATICALT
2006
117views more  INFORMATICALT 2006»
13 years 8 months ago
Job Sequencing with Exponential Functions of Processing Times
We study single machine scheduling problems, where processing times of the jobs are exponential functions of their start times. For increasing functions, we prove strong NP-hardnes...
Adam Janiak, Mikhail Y. Kovalyov
AMC
2005
120views more  AMC 2005»
13 years 8 months ago
ICS: a package for computing involutive characteristic set of algebraic partial differential equation systems
A constructive algorithm for the completion of arbitrary algebraic partial differential equation systems to involutive ones are presented. Based on it, an implementation ICS for c...
Shan-Qing Zhang, Gui-Xu Zhang, Zhi-Bin Li
AUTOMATICA
2005
95views more  AUTOMATICA 2005»
13 years 8 months ago
A note on asymptotic stabilization of linear systems by periodic, piecewise constant, output feedback
This note studies the asymptotic stabilization problem for controllable and observable, single-input single-output, linear, time-invariant, continuous-time systems by means of mem...
J. C. Allwright, Alessandro Astolfi, H. P. Wong
TIT
2008
107views more  TIT 2008»
13 years 8 months ago
Computing Binary Combinatorial Gray Codes Via Exhaustive Search With SAT Solvers
The term binary combinatorial Gray code refers to a list of binary words such that the Hamming distance between two neighboring words is one and the list satisfies some additional ...
Igor Zinovik, Daniel Kroening, Yury Chebiryak
MOC
1998
62views more  MOC 1998»
13 years 7 months ago
Numerical evaluation of a symmetric potential function
Abstract. We discuss the numerical evaluation of a symmetric potential function which arises naturally in applications. We present a method designed to accurately and efficiently c...
Lori A. Carmack