Sciweavers

329 search results - page 54 / 66
» SLX: the X is for extensibility
Sort
View
IWFM
1998
13 years 9 months ago
Towards an Override in Topoi
Models of software systems are built in Z and VDM using partial functions between sets and certain operations on these partial functions : extension ( ), restriction ( ), removal ...
Arthur P. Hughes
JCT
2000
111views more  JCT 2000»
13 years 7 months ago
Immanants and Finite Point Processes
Givena Hermitian,non-negativede nitekernelK and a character of the symmetric group on n letters, de ne the corresponding immanant function K x1;::: ;xn := P Qn i=1 Kxi;x i, where ...
Persi Diaconis, Steven N. Evans
GIS
1998
ACM
13 years 7 months ago
Mean-Variance Analysis of the Performance of Spatial Ordering Methods
Geographical Information Systems (GIS) involve the manipulation of large spatial data sets, and the performance of these systems is often determined by how these data sets are orga...
Akhil Kumar, Waleed A. Muhanna, Raymond A. Patters...
RSA
1998
93views more  RSA 1998»
13 years 7 months ago
Parallel randomized load balancing
It is well known that after placing n balls independently and uniformly at random into n bins, the fullest bin holds (logn=log logn) balls with high probability. Recently, Azar et...
Micah Adler, Soumen Chakrabarti, Michael Mitzenmac...
SIAMCOMP
1998
118views more  SIAMCOMP 1998»
13 years 7 months ago
Genericity, Randomness, and Polynomial-Time Approximations
Polynomial-time safe and unsafe approximations for intractable sets were introduced by Meyer and Paterson [Technical Report TM-126, Laboratory for Computer Science, MIT, Cambridge,...
Yongge Wang