Sciweavers

AAECC
1995
Springer
137views Algorithms» more  AAECC 1995»
14 years 3 months ago
About Approximations of Exponentials
Abstract. We look for the approximation of exp(A1 + A2) by a product in form exp(x1A1) exp(y1A2) · · · exp(xnA1) exp(ynA2). We specially are interested in minimal approximations...
Pierre-Vincent Koseleff
AAECC
1995
Springer
86views Algorithms» more  AAECC 1995»
14 years 3 months ago
Isometry Classes of Indecomposable Linear Codes
Harald Fripertinger, Adalbert Kerber
AAECC
1995
Springer
92views Algorithms» more  AAECC 1995»
14 years 3 months ago
Division of Entire Functions by Polynomial Ideals
In [ASTW] it was given a Grobner reduction based division formula for entire functions by polynomial ideals. Here we give degree bounds where the input function can be truncated i...
Joachim Apel
COCO
1997
Springer
77views Algorithms» more  COCO 1997»
14 years 3 months ago
Constraint Satisfaction: The Approximability of Minimization Problems
Sanjeev Khanna, Madhu Sudan, Luca Trevisan
OOPSLA
2000
Springer
14 years 3 months ago
Scalable propagation-based call graph construction algorithms
Propagation-based call graph construction algorithms have been studied intensively in the 1990s, and differ primarily in the number of sets that are used to approximate run-time v...
Frank Tip, Jens Palsberg
WDAG
1998
Springer
107views Algorithms» more  WDAG 1998»
14 years 3 months ago
Java: Memory Consistency and Process Coordination
Lisa Higham, Jalal Kawash
STOC
1998
ACM
112views Algorithms» more  STOC 1998»
14 years 3 months ago
Adaptive Packet Routing for Bursty Adversarial Traffic
William Aiello, Eyal Kushilevitz, Rafail Ostrovsky...
ISAAC
2000
Springer
95views Algorithms» more  ISAAC 2000»
14 years 3 months ago
Finding a Two-Core of a Tree in Linear Time
Biing-Feng Wang, Jyh-Jye Lin
ISAAC
2000
Springer
113views Algorithms» more  ISAAC 2000»
14 years 3 months ago
A New Competitive Analysis of Randomized Caching
Ching Law, Charles E. Leiserson