Sciweavers

1357 search results - page 230 / 272
» Compositional analysis for linear systems
Sort
View
QUESTA
2010
131views more  QUESTA 2010»
13 years 8 months ago
Asymptotically optimal parallel resource assignment with interference
Motivated by scheduling in cellular wireless networks and resource allocation in computer systems, we study a service facility with two classes of users having heterogeneous servi...
Maaike Verloop, R. Núñez Queija
SEKE
2010
Springer
13 years 8 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
CC
2010
Springer
120views System Software» more  CC 2010»
13 years 7 months ago
Lower Bounds for Agnostic Learning via Approximate Rank
We prove that the concept class of disjunctions cannot be pointwise approximated by linear combinations of any small set of arbitrary real-valued functions. That is, suppose that t...
Adam R. Klivans, Alexander A. Sherstov
CDC
2010
IEEE
111views Control Systems» more  CDC 2010»
13 years 5 months ago
Multi-robot monitoring in dynamic environments with guaranteed currency of observations
Abstract-- In this paper we consider the problem of monitoring a known set of stationary features (or locations of interest) in an environment. To observe a feature, a robot must v...
Stephen L. Smith, Daniela Rus
JDCTA
2010
203views more  JDCTA 2010»
13 years 5 months ago
Preprocessing Method for NaXi Pictographs Character Recognition Using Wavelet Transform
Preprocessing, a major component of Character Recognition System, has direct effect on the recognition system by its performance. Using wavelet transform, this paper mainly focuse...
Hai Guo, Jing-ying Zhao, Xiao-niu Li