Sciweavers

1996 search results - page 379 / 400
» A decision procedure for linear
Sort
View
ISAAC
2005
Springer
153views Algorithms» more  ISAAC 2005»
15 years 3 months ago
Network Game with Attacker and Protector Entities
Consider an information network with harmful procedures called attackers (e.g., viruses); each attacker uses a probability distribution to choose a node of the network to damage. O...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
GCB
2004
Springer
101views Biometrics» more  GCB 2004»
15 years 3 months ago
Kleene's Theorem and the Solution of Metabolic Carbon Labeling Systems
: Carbon Labeling Systems (CLS) are large equation systems that describe the dynamics of labeled carbon atoms in a metabolic network. The rapid solution of these systems is the alg...
Nicole Isermann, Michael Weitzel, Wolfgang Wiecher...
96
Voted
ICRA
2003
IEEE
148views Robotics» more  ICRA 2003»
15 years 3 months ago
Needle insertion and radioactive seed implantation in human tissues: simulation and sensitivity analysis
− To facilitate training and planning for medical procedures such as prostate brachytherapy, we are developing an interactive simulation of needle insertion and radioactive seed ...
Ron Alterovitz, Kenneth Y. Goldberg, Jean Pouliot,...
89
Voted
ISPD
2003
ACM
110views Hardware» more  ISPD 2003»
15 years 3 months ago
Explicit gate delay model for timing evaluation
Delay evaluation is always a crucial concern in the VLSI design and it becomes increasingly more critical in the nowadays deep-submicron technology. To obtain an accurate delay va...
Muzhou Shao, Martin D. F. Wong, Huijing Cao, Youxi...
MMB
2010
Springer
194views Communications» more  MMB 2010»
15 years 3 months ago
Searching for Tight Performance Bounds in Feed-Forward Networks
Abstract. Computing tight performance bounds in feed-forward networks under general assumptions about arrival and server models has turned out to be a challenging problem. Recently...
Andreas Kiefer, Nicos Gollan, Jens B. Schmitt