Sciweavers

2050 search results - page 266 / 410
» constraints 2010
Sort
View
PIMRC
2010
IEEE
13 years 8 months ago
Efficient cooperative protocols for general outage-limited multihop wireless networks
Abstract-- Due to the limited energy supplies of nodes in wireless networks, achieving energy efficiency is crucial for extending the lifetime of these networks. Thus, we study eff...
Behrouz Maham, Walid Saad, Mérouane Debbah,...
PEPM
2010
ACM
14 years 7 months ago
PET: a partial evaluation-based test case generation tool for Java bytecode
PET is a prototype Partial Evaluation-based Test case generation tool for a subset of Java bytecode programs. It performs white-box test generation by means of two consecutive Par...
Elvira Albert, Miguel Gómez-Zamalloa, Germ&...
CORR
2010
Springer
121views Education» more  CORR 2010»
13 years 8 months ago
Mechanism Design via Correlation Gap
For revenue and welfare maximization in singledimensional Bayesian settings, Chawla et al. (STOC10) recently showed that sequential posted-price mechanisms (SPMs), though simple i...
Qiqi Yan
LATIN
2010
Springer
13 years 8 months ago
On Quadratic Threshold CSPs
A predicate P : {−1, 1}k → {0, 1} can be associated with a constraint satisfaction problem Max CSP(P). P is called “approximation resistant” if Max CSP(P) cannot be approxi...
Per Austrin, Siavosh Benabbas, Avner Magen
ICFEM
2010
Springer
13 years 8 months ago
Loop Invariant Synthesis in a Combined Domain
Abstract. Automated verification of memory safety and functional correctness for heap-manipulating programs has been a challenging task, especially when dealing with complex data ...
Shengchao Qin, Guanhua He, Chenguang Luo, Wei-Ngan...