Sciweavers

3820 search results - page 70 / 764
» Bounded Model Debugging
Sort
View
CEFP
2005
Springer
15 years 7 months ago
Exploiting Purely Functional Programming to Obtain Bounded Resource Behaviour: The Hume Approach
This chapter describes Hume: a functionally-based language for programming with bounded resource usage, including time and space properties. The purpose of the Hume language design...
Kevin Hammond
MSWIM
2004
ACM
15 years 7 months ago
Scalable simulation of large-scale wireless networks with bounded inaccuracies
Discrete event network simulators have emerged as popular tools for verification and performance evaluation for various wireless networks. Nevertheless, the desire to model such ...
Zhengrong Ji, Junlan Zhou, Mineo Takai, Rajive Bag...
CSDA
2004
119views more  CSDA 2004»
15 years 1 months ago
Bounded optimal knots for regression splines
Using a B-spline representation for splines with knots seen as free variables, the approximation to data by splines improves greatly. The main limitations are the presence of too ...
Nicolas Molinari, Jean-François Durand, Rob...
SODA
2012
ACM
245views Algorithms» more  SODA 2012»
13 years 4 months ago
Lower bounds for number-in-hand multiparty communication complexity, made easy
In this paper we prove lower bounds on randomized multiparty communication complexity, both in the blackboard model (where each message is written on a blackboard for all players ...
Jeff M. Phillips, Elad Verbin, Qin Zhang
STOC
2007
ACM
142views Algorithms» more  STOC 2007»
16 years 2 months ago
Lower bounds for randomized read/write stream algorithms
Motivated by the capabilities of modern storage architectures, we consider the following generalization of the data stream model where the algorithm has sequential access to multi...
Paul Beame, T. S. Jayram, Atri Rudra