Sciweavers

678 search results - page 121 / 136
» The Theory of Weak Stabilization
Sort
View
JCC
2010
95views more  JCC 2010»
13 years 6 months ago
Computational studies on electron and proton transfer in phenol-imidazole-base triads
: The electron and proton transfer in phenol-imidazole-base systems (base 5 NH2 2 or OH2 ) were investigated by density-functional theory calculations. In particular, the role of b...
Shihai Yan, Sunwoo Kang, Tomoyuki Hayashi, Shaul M...
CORR
2011
Springer
198views Education» more  CORR 2011»
13 years 2 months ago
Kron Reduction of Graphs with Applications to Electrical Networks
Abstract. Consider a weighted and undirected graph, possibly with self-loops, and its corresponding Laplacian matrix, possibly augmented with additional diagonal elements correspon...
Florian Dörfler, Francesco Bullo
POPL
2006
ACM
14 years 7 months ago
Harmless advice
This paper defines an object-oriented language with harmless aspect-oriented advice. A piece of harmless advice is a computation that, like ordinary aspect-oriented advice, execut...
Daniel S. Dantas, David Walker
POPL
2010
ACM
14 years 5 months ago
Dependent types and program equivalence
The definition of type equivalence is one of the most important design issues for any typed language. In dependentlytyped languages, because terms appear in types, this definition...
Jianzhou Zhao, Limin Jia, Stephanie Weirich, Vilhe...
ATAL
2007
Springer
14 years 1 months ago
Commitment and extortion
Making commitments, e.g., through promises and threats, enables a player to exploit the strengths of his own strategic position as well as the weaknesses of that of his opponents....
Paul Harrenstein, Felix Brandt, Felix A. Fischer