Sciweavers

376 search results - page 29 / 76
» Self-Stabilizing Graph Protocols
Sort
View
FTCS
1998
84views more  FTCS 1998»
13 years 9 months ago
On the Use of Formal Techniques for Validation
The traditional use of formal methods has been for the veri cation of algorithms or protocols. Given the high cost and limitations in state space coverage provided by conventional...
Neeraj Suri, Purnendu Sinha
ICRA
2008
IEEE
147views Robotics» more  ICRA 2008»
14 years 2 months ago
Automatic deployment and formation control of decentralized multi-agent networks
— Novel tools are needed to deploy multi-agent networks in applications that require a high degree of accuracy in the achievement and maintenance of geometric formations. This is...
Brian Stephen Smith, Magnus Egerstedt, Ayanna M. H...
CN
1999
56views more  CN 1999»
13 years 7 months ago
Surfing the Web Backwards
From a user's perspective, hypertext links on the web form a directed graph between distinct information sources. We investigate the effects of discovering "backlinks&qu...
Soumen Chakrabarti, David Gibson, Kevin S. McCurle...
SODA
2008
ACM
96views Algorithms» more  SODA 2008»
13 years 9 months ago
Unconditionally reliable message transmission in directed networks
In the unconditionally reliable message transmission (URMT) problem, two non-faulty players, the sender S and the receiver R are part of a synchronous network modeled as a directe...
Bhavani Shankar, Prasant Gopal, Kannan Srinathan, ...
SIGCOMM
2006
ACM
14 years 1 months ago
Systematic topology analysis and generation using degree correlations
Researchers have proposed a variety of metrics to measure important graph properties, for instance, in social, biological, and computer networks. Values for a particular graph met...
Priya Mahadevan, Dmitri V. Krioukov, Kevin R. Fall...