Sciweavers

7986 search results - page 165 / 1598
» Computational Science and its Applications
Sort
View
GI
2007
Springer
15 years 11 months ago
Fuzzy Operators for Confidence Modelling in Automotive Safety Applications
: The fusion of data from different sensorial sources is the most promising method to increase robustness and reliability of environmental perception today. The paper presents an a...
Ulrich Scheunert, Philipp Lindner, Eric Richter, G...
FOCS
2006
IEEE
15 years 11 months ago
A Local Switch Markov Chain on Given Degree Graphs with Application in Connectivity of Peer-to-Peer Networks
We study a switch Markov chain on regular graphs, where switches are allowed only between links that are at distance 3; we call this the Flip. The motivation for studying the Flip...
Tomás Feder, Adam Guetz, Milena Mihail, Ami...
ACMSE
2006
ACM
15 years 11 months ago
Inductive bases and their application to searches for minimal unary NFAs
Classic results in the theory of regular languages show that the problem of converting an NFA (nondeterministic finite automaton) into a minimal equivalent NFA is NP-hard, even f...
Geoffrey Smith
STACS
1999
Springer
15 years 9 months ago
Balanced Randomized Tree Splitting with Applications to Evolutionary Tree Constructions
We present a new technique called balanced randomized tree splitting. It is useful in constructing unknown trees recursively. By applying it we obtain two new results on efficient ...
Ming-Yang Kao, Andrzej Lingas, Anna Östlin
106
Voted
GI
2007
Springer
15 years 9 months ago
Tracking the Asymmetric Threat - Operational Requirements and Technical Solutions for Security Applications
: The asymmetric adversary poses a serious threat to civil and military facilities. Hence, the defence against such adversaries, the so-called anti asymmetric warfare, is of intere...
Felix Opitz, Kaeye Dästner, Thomas Kausch