Sciweavers

CORR
2008
Springer
122views Education» more  CORR 2008»
13 years 9 months ago
Strategy Improvement for Concurrent Safety Games
We consider concurrent games played on graphs. At every round of the game, each player simultaneously and independently selects a move; the moves jointly determine the transition ...
Krishnendu Chatterjee, Luca de Alfaro, Thomas A. H...
CORR
2010
Springer
146views Education» more  CORR 2010»
13 years 9 months ago
Modified Bully Algorithm using Election Commission
-- Electing leader is a vital issue not only in distributed computing but also in communication network [1, 2, 3, 4, 5], centralized mutual exclusion algorithm [6, 7], centralized ...
Muhammad Mahbubur Rahman, Afroza Nahar
CORR
2010
Springer
159views Education» more  CORR 2010»
13 years 9 months ago
An Elimination Method for Solving Bivariate Polynomial Systems: Eliminating the Usual Drawbacks
We present an exact and complete algorithm to isolate the real solutions of a zero-dimensional bivariate polynomial system. The proposed algorithm constitutes an elimination metho...
Eric Berberich, Pavel Emeliyanenko, Michael Sagral...
CORR
2008
Springer
158views Education» more  CORR 2008»
13 years 9 months ago
Distributed and Recursive Parameter Estimation in Parametrized Linear State-Space Models
We consider a network of sensors deployed to sense a spatio-temporal field and infer parameters of interest about the field. We are interested in the case where each sensor's...
S. Sundhar Ram, Venugopal V. Veeravalli, Angelia N...
CORR
2008
Springer
82views Education» more  CORR 2008»
13 years 9 months ago
Adaptive Dynamics of Realistic Small-World Networks
Continuing in the steps of Jon Kleinberg's and others celebrated work on decentralized search, we conduct an experimental analysis of destination sampling, a dynamic algorithm...
Olof Mogren, Oskar Sandberg, Vilhelm Verendel, Dev...
CORR
2008
Springer
120views Education» more  CORR 2008»
13 years 9 months ago
Cache-Oblivious Selection in Sorted X+Y Matrices
Let X[0..n - 1] and Y [0..m - 1] be two sorted arrays, and define the m
Mark de Berg, Shripad Thite
CORR
2008
Springer
99views Education» more  CORR 2008»
13 years 9 months ago
Decomposing replicable functions
We describe an algorithm to decompose rational functions from which we determine the poset of groups fixing these functions.
John McKay, David Sevilla
CORR
2008
Springer
116views Education» more  CORR 2008»
13 years 9 months ago
On the Computation of the Topology of a Non-Reduced Implicit Space Curve
An algorithm is presented for the computation of the topology of a non-reduced space curve defined as the intersection of two implicit algebraic surfaces. It computes a Piecewise ...
Daouda Niang Diatta, Bernard Mourrain, Olivier Rua...
CORR
2008
Springer
98views Education» more  CORR 2008»
13 years 9 months ago
Void Traversal for Guaranteed Delivery in Geometric Routing
Geometric routing algorithms like GFG (GPSR) are lightweight, scalable algorithms that can be used to route in resource-constrained ad hoc wireless networks. However, such algorith...
Mikhail Nesterenko, Adnan Vora
CORR
2010
Springer
150views Education» more  CORR 2010»
13 years 9 months ago
Extraction of Symbolic Rules from Artificial Neural Networks
Although backpropagation ANNs generally predict better than decision trees do for pattern classification problems, they are often regarded as black boxes, i.e., their predictions c...
S. M. Kamruzzaman, Md. Monirul Islam