Sciweavers

3820 search results - page 678 / 764
» Bounded Model Debugging
Sort
View
FSTTCS
2010
Springer
15 years 3 days ago
Combinatorial Problems with Discounted Price Functions in Multi-agent Systems
ABSTRACT. Motivated by economic thought, a recent research agenda has suggested the algorithmic study of combinatorial optimization problems under functions which satisfy the prope...
Gagan Goel, Pushkar Tripathi, Lei Wang
IMC
2010
ACM
15 years 23 hour ago
On the impact of layer-2 on node degree distribution
The Internet topology data collected through traceroute exploration has been extensively studied in the past. In particular, a remarkable property of the Internet, the power-law s...
Pascal Mérindol, Benoit Donnet, Olivier Bon...
PIMRC
2010
IEEE
14 years 12 months ago
Downlink capacity of two-tier cognitive femto networks
Abstract--In two-tier networks consisting of a macrocell overlaid with femtocells in co-channel deployment and closed-access policy, spatial reuse is achieved at the price of sever...
Shin-Ming Cheng, Weng-Chon Ao, Kwang-Cheng Chen
TACAS
2010
Springer
212views Algorithms» more  TACAS 2010»
14 years 12 months ago
Assume-Guarantee Verification for Probabilistic Systems
Abstract. We present a compositional verification technique for systems that exhibit both probabilistic and nondeterministic behaviour. We adopt an assume-guarantee approach to ver...
Marta Z. Kwiatkowska, Gethin Norman, David Parker,...
ICITS
2009
14 years 12 months ago
Linear Threshold Multisecret Sharing Schemes
In a multisecret sharing scheme, several secret values are distributed among a set of n users, and each secret may have a different associated access structure. We consider here un...
Oriol Farràs, Ignacio Gracia, Sebasti&agrav...