Sciweavers

639 search results - page 90 / 128
» Dominance Constraints with Set Operators
Sort
View
JNS
2008
76views more  JNS 2008»
14 years 9 months ago
Discrete Nonholonomic Lagrangian Systems on Lie Groupoids
This paper studies the construction of geometric integrators for nonholonomic systems. We derive the nonholonomic discrete Euler-Lagrange equations in a setting which permits to de...
David Iglesias, Juan C. Marrero, David Martí...
JPDC
2008
122views more  JPDC 2008»
14 years 9 months ago
Stochastic robustness metric and its use for static resource allocations
This research investigates the problem of robust static resource allocation for distributed computing systems operating under imposed Quality of Service (QoS) constraints. Often, ...
Vladimir Shestak, Jay Smith, Anthony A. Maciejewsk...
ISCI
2007
170views more  ISCI 2007»
14 years 9 months ago
Automatic learning of cost functions for graph edit distance
Graph matching and graph edit distance have become important tools in structural pattern recognition. The graph edit distance concept allows us to measure the structural similarit...
Michel Neuhaus, Horst Bunke
MST
2000
101views more  MST 2000»
14 years 9 months ago
Robust Parallel Computations through Randomization
In this paper we present an efficient general simulation strategy for computations designed for fully operational BSP machines of n ideal processors, on n-processor dynamic-fault-p...
Spyros C. Kontogiannis, Grammati E. Pantziou, Paul...
JCS
2002
115views more  JCS 2002»
14 years 9 months ago
Panoptis: Intrusion Detection Using a Domain-Specific Language
We describe the use of a domain-specific language (DSL) for expressing critical design values and constraints in an intrusion detection application. Through the use of this specia...
Diomidis Spinellis, Dimitris Gritzalis