Sciweavers

1486 search results - page 129 / 298
» Algorithms for two-box covering
Sort
View
FOSSACS
2010
Springer
15 years 11 months ago
Forward Analysis of Depth-Bounded Processes
Depth-bounded processes form the most expressive known fragment of the π-calculus for which interesting verification problems are still decidable. In this paper we develop an ade...
Thomas Wies, Damien Zufferey, Thomas A. Henzinger
JACM
2006
112views more  JACM 2006»
15 years 4 months ago
Linear work suffix array construction
Suffix trees and suffix arrays are widely used and largely interchangeable index structures on strings and sequences. Practitioners prefer suffix arrays due to their simplicity an...
Juha Kärkkäinen, Peter Sanders, Stefan B...
SODA
2010
ACM
172views Algorithms» more  SODA 2010»
16 years 1 months ago
A quasi-polynomial time approximation scheme for Euclidean capacitated vehicle routing
In the capacitated vehicle routing problem, introduced by Dantzig and Ramser in 1959, we are given the locations of n customers and a depot, along with a vehicle of capacity k, an...
Aparna Das, Claire Mathieu
GECCO
2005
Springer
132views Optimization» more  GECCO 2005»
15 years 9 months ago
Evolving computer intrusion scripts for vulnerability assessment and log analysis
Evolutionary computation is used to construct undetectable computer attack scripts. Using a simulated operating system, we show that scripts can be evolved to cover their tracks a...
Julien Budynek, Eric Bonabeau, Ben Shargel
DATE
2010
IEEE
145views Hardware» more  DATE 2010»
15 years 9 months ago
KL-Cuts: A new approach for logic synthesis targeting multiple output blocks
— This paper introduces the concept of kl-feasible cuts, by controlling both the number k of inputs and the number l of outputs in a circuit cut. To provide scalability, the conc...
Osvaldo Martinello, Felipe S. Marques, Renato P. R...