Sciweavers

3082 search results - page 86 / 617
» New Bounds for the Controller Problem
Sort
View
ICALP
2010
Springer
15 years 8 months ago
Network Design via Core Detouring for Problems without a Core
Some of the currently best-known approximation algorithms for network design are based on random sampling. One of the key steps of such algorithms is connecting a set of source nod...
Fabrizio Grandoni, Thomas Rothvoß
163
Voted
MOC
2010
14 years 10 months ago
H(div) preconditioning for a mixed finite element formulation of the diffusion problem with random data
We study H(div) preconditioning for the saddle-point systems that arise in a stochastic Galerkin mixed formulation of the steady-state diffusion problem with random data. The key i...
Howard C. Elman, Darran G. Furnival, Catherine E. ...
136
Voted
KBSE
2009
IEEE
15 years 10 months ago
SMT-Based Bounded Model Checking for Embedded ANSI-C Software
Propositional bounded model checking has been applied successfully to verify embedded software but is limited by the increasing propositional formula size and the loss of structur...
Lucas Cordeiro, Bernd Fischer, João Marques...
142
Voted
JACM
2002
87views more  JACM 2002»
15 years 3 months ago
Bounded concurrent timestamp systems using vector clocks
Abstract. Shared registers are basic objects used as communication mediums in asynchronous concurrent computation. A concurrent timestamp system is a higher typed communication obj...
Sibsankar Haldar, Paul M. B. Vitányi
139
Voted
CIA
2006
Springer
15 years 7 months ago
Risk-Bounded Formation of Fuzzy Coalitions Among Service Agents
Cooperative autonomous agents form coalitions in order to share and combine resources and services to efficiently respond to market demands. With the variety of resources and servi...
Bastian Blankenburg, Minghua He, Matthias Klusch, ...