Sciweavers

4722 search results - page 736 / 945
» Representation-independent program analysis
Sort
View
IIE
2006
108views more  IIE 2006»
13 years 8 months ago
The IOI is (not) a Science Olympiad
Abstract. The International Olympiad in Informatics (IOI) aspires to be a science olympiad alongside such international olympiads in mathematics, physics, chemistry, and biology. I...
Tom Verhoeff
IJWIN
2006
209views more  IJWIN 2006»
13 years 8 months ago
On Connected Multiple Point Coverage in Wireless Sensor Networks
Abstract-- We consider a wireless sensor network consisting of a set of sensors deployed randomly. A point in the monitored area is covered if it is within the sensing range of a s...
Shuhui Yang, Fei Dai, Mihaela Cardei, Jie Wu, Floy...
CORR
2007
Springer
68views Education» more  CORR 2007»
13 years 8 months ago
An Improved Tight Closure Algorithm for Integer Octagonal Constraints
Integer octagonal constraints (a.k.a. Unit Two Variables Per Inequality or UTVPI integer constraints) constitute an interesting class of constraints for the representation and solu...
Roberto Bagnara, Patricia M. Hill, Enea Zaffanella
EOR
2007
105views more  EOR 2007»
13 years 8 months ago
Newton's method and its use in optimization
Newton’s method is a basic tool in numerical analysis and numerous applications, including operations research and data mining. We survey the history of the method, its main ide...
Boris T. Polyak
IJNSEC
2007
154views more  IJNSEC 2007»
13 years 8 months ago
Integrity of mobile agents: a new approach
The recent developments in the mobile technology (mobile phones, middleware) created a need for new methods of protecting the code transmitted through the network. The oldest and ...
Aneta Zwierko, Zbigniew Kotulski