Sciweavers

8109 search results - page 1273 / 1622
» A Model of Component-Based Programming
Sort
View
258
Voted
ENTCS
2006
273views more  ENTCS 2006»
15 years 5 months ago
Operator Algebras and the Operational Semantics of Probabilistic Languages
We investigate the construction of linear operators representing the semantics of probabilistic programming languages expressed via probabilistic transition systems. Finite transi...
Alessandra Di Pierro, Herbert Wiklicky
IJISEC
2008
119views more  IJISEC 2008»
15 years 5 months ago
Estimating the maximum information leakage
Preventing improper information leaks is a greatest challenge of the modern society. In this paper we present a technique for measuring the ability of several families of adversari...
Alessandro Aldini, Alessandra Di Pierro
IJRR
2008
106views more  IJRR 2008»
15 years 5 months ago
Cooperative Cleaners: A Study in Ant Robotics
Abstract. In the world of living creatures, "simple minded" animals often cooperate to achieve common goals with amazing performance. One can consider this idea in the co...
Israel A. Wagner, Yaniv Altshuler, Vladimir Yanovs...
IJSNET
2008
125views more  IJSNET 2008»
15 years 5 months ago
Minimum-cost sensor arrangement for achieving wanted coverage lifetime
: Suppose we need to watch a set of targets continuously for a required period of time, and suppose we choose any number of sensors from a fixed set of sensor types and place them ...
Jie Wang, Ning Zhong
IJAC
2006
87views more  IJAC 2006»
15 years 5 months ago
Evaluation Properties of Symmetric Polynomials
By the fundamental theorem of symmetric polynomials, if P Q[X1, . . . , Xn] is symmetric, then it can be written P = Q(1, . . . , n), where 1, . . . , n are the elementary symmet...
Pierrick Gaudry, Éric Schost, Nicolas M. Th...
« Prev « First page 1273 / 1622 Last » Next »