Sciweavers

7971 search results - page 11 / 1595
» On unbounded operators and applications
Sort
View
DASFAA
2009
IEEE
101views Database» more  DASFAA 2009»
14 years 5 months ago
Eager Evaluation of Partial Tree-Pattern Queries on XML Streams
Current streaming applications have stringent requirements on query response time and memory consumption because of the large (possibly unbounded) size of data they handle. Further...
Dimitri Theodoratos, Xiaoying Wu
CSFW
2010
IEEE
14 years 2 months ago
Approximation and Randomization for Quantitative Information-Flow Analysis
—Quantitative information-flow analysis (QIF) is an emerging technique for establishing information-theoretic confidentiality properties. Automation of QIF is an important step...
Boris Köpf, Andrey Rybalchenko
ICRA
2008
IEEE
113views Robotics» more  ICRA 2008»
14 years 5 months ago
Inverse agreement algorithms with application to swarm dispersion for multiple nonholonomic agents
— We propose an inverse agreement control strategy for multiple nonholonomic agents that forces the team members to disperse in the workspace in a distributed manner. Both the ca...
Dimos V. Dimarogonas, Kostas J. Kyriakopoulos
ACSD
2004
IEEE
118views Hardware» more  ACSD 2004»
14 years 2 months ago
Verification and Implementation of Delay-Insensitive Processes in Restrictive Environments
Abstract. A delay-insensitive module communicates with its environment through wires of unbounded delay. To avoid transmission interference, the absorption of a signal transition m...
Hemangee K. Kapoor, Mark B. Josephs, Dennis P. Fur...
SYNASC
2007
IEEE
138views Algorithms» more  SYNASC 2007»
14 years 5 months ago
Some Applications of Weakly Picard Operators
Abstract. In this paper we give some applications of weakly Picard operators theory to linear positive approximation operators, to difference equations with deviating argument and...
Ioan A. Rus