Sciweavers

753 search results - page 91 / 151
» Fragments-based Model Reduction: Some Case Studies
Sort
View
WDAG
2007
Springer
105views Algorithms» more  WDAG 2007»
14 years 3 months ago
Rendezvous of Mobile Agents in Unknown Graphs with Faulty Links
A group of identical mobile agents moving asynchronously among the nodes of an anonymous network have to gather together in a single node of the graph. This problem known as the (a...
Jérémie Chalopin, Shantanu Das, Nico...
ESA
2008
Springer
134views Algorithms» more  ESA 2008»
13 years 10 months ago
Improved Randomized Results for That Interval Selection Problem
Online interval selection is a problem in which intervals arrive one by one, sorted by their left endpoints. Each interval has a length and a non-negative weight associated with i...
Leah Epstein, Asaf Levin
JSW
2008
104views more  JSW 2008»
13 years 9 months ago
Testing Software Assets of Framework-Based Product Families During Application Engineering Stage
An application framework provides reusable design and implementation for a family of software systems. At the application engineering stage, application developers extend framework...
Jehad Al-Dallal, Paul G. Sorenson
JSYML
2008
72views more  JSYML 2008»
13 years 9 months ago
Perfect trees and elementary embeddings
An important technique in large cardinal set theory is that of extending an elementary embedding j : M N between inner models to an elementary embedding j : M[G] N[G] between ge...
Sy-David Friedman, Katherine Thompson
PE
2008
Springer
113views Optimization» more  PE 2008»
13 years 9 months ago
Joint uplink and downlink admission control to both streaming and elastic flows in CDMA/HSDPA systems
TCP-based data flows generate packets and ACKs in two directions, be it in the wireline or wireless networks. In the latter case, packets are typically found in the downlink where...
Tijani Chahed, Eitan Altman, Salah-Eddine Elayoubi