Sciweavers

2841 search results - page 74 / 569
» A Call to Order
Sort
View
JGT
2008
61views more  JGT 2008»
14 years 9 months ago
Irregularity strength of dense graphs
Let G be a simple graph of order n with no isolated vertices and no isolated edges. For a positive integer w, an assignment f on G is a function f : E(G) {1, 2, . . . , w}. For a ...
Bill Cuckler, Felix Lazebnik
ENGL
2007
91views more  ENGL 2007»
14 years 9 months ago
RRT-based strategies for sensor-based exploration
—Real mobile robots should be able to build an abstract representation of the physical environment, in order to navigate and to work in such environment. We present a method for ...
Abraham Sánchez López, Judith Le&oac...
WAIM
2010
Springer
14 years 8 months ago
Trustworthy Information: Concepts and Mechanisms
We used to treating information received (from recognized sources) as trustworthy, which is unfortunately not true because of attacks. The situation can get worse with the emerging...
Shouhuai Xu, Haifeng Qian, Fengying Wang, Zhenxin ...
ISCAS
2005
IEEE
99views Hardware» more  ISCAS 2005»
15 years 3 months ago
Concentrator access networks for programmable logic cores on SoCs
- The inclusion of programmable logic cores in modern SoCs motivates the need for an access network to make full use of this resource. The programmable nature of these cores remove...
Bradley R. Quinton, Steven J. E. Wilton
TASE
2009
IEEE
15 years 4 months ago
Semantics of Metamodels in UML
A modelling language can be defined by a metamodel in UML class diagram. This paper defines the semantics of such metamodels through two mappings: a signature mapping from metamod...
Lijun Shan, Hong Zhu