Sciweavers

2125 search results - page 121 / 425
» Points with Type-2 Operations
Sort
View
EOR
2007
105views more  EOR 2007»
15 years 3 months ago
Newton's method and its use in optimization
Newton’s method is a basic tool in numerical analysis and numerous applications, including operations research and data mining. We survey the history of the method, its main ide...
Boris T. Polyak
SIGOPS
2008
95views more  SIGOPS 2008»
15 years 3 months ago
Virtual machine time travel using continuous data protection and checkpointing
Virtual machine (VM) time travel enables reverting a virtual machine's state, both transient and persistent, to past points in time. This capability can be used to improve vi...
Paula Ta-Shma, Guy Laden, Muli Ben-Yehuda, Michael...
125
Voted
JSAC
2007
93views more  JSAC 2007»
15 years 3 months ago
Optimal Virtual Topology Design using Bus-Label Switched Paths
— Although there is a trend in reducing the number of layers in core and metropolitan area networks, still the optimal design of multi-layer networks (like IP over WDM) remains a...
Yannick Brehon, Daniel Kofman, Michal Pióro...
89
Voted
JC
2002
50views more  JC 2002»
15 years 3 months ago
Verifying Topological Indices for Higher-Order Rank Deficiencies
It has been known how to use computational fixed point theorems to verify existence and uniqueness of a true solution to a nonlinear system of equations within a small region abou...
R. Baker Kearfott, Jianwei Dian
ICRA
2010
IEEE
128views Robotics» more  ICRA 2010»
15 years 1 months ago
A robotic module for stochastic fluidic assembly of 3D self-reconfiguring structures
— Stochastic self-reconfiguring robots are modular robots that possess the ability to autonomously change the arrangement of their modules and do so through the use of nondetermi...
Jonas Neubert, Abraham P. Cantwell, Stephane Const...