Sciweavers

2584 search results - page 257 / 517
» On the Forward Checking Algorithm
Sort
View
DAC
2004
ACM
15 years 6 months ago
Symmetry detection for incompletely specified functions
In this paper, we formulate symmetry detection for incompletely specified functions as an equation without using cofactor computation and equivalence checking. Based on this equat...
Kuo-Hua Wang, Jia-Hung Chen
128
Voted
SIGCOMM
1995
ACM
15 years 6 months ago
Performance of Checksums and CRCs over Real Data
Checksum and CRC algorithms have historically been studied under the assumption that the data fed to the algorithms was uniformly distributed. This paper examines the behavior of ...
Craig Partridge, James Hughes, Jonathan Stone
DIALM
2008
ACM
139views Algorithms» more  DIALM 2008»
15 years 4 months ago
Approximating maximum integral flows in wireless sensor networks via weighted-degree constrained k-flows
We consider the Maximum Integral Flow with Energy Constraints problem: given a directed graph G = (V, E) with edge-weights {w(e) : e E} and node battery capacities {b(v) : v V }...
Zeev Nutov
AAAI
2004
15 years 4 months ago
Low-cost Addition of Preferences to DTPs and TCSPs
We present an efficient approach to adding soft constraints, in the form of preferences, to Disjunctive Temporal Problems (DTPs) and their subclass Temporal Constraint Satisfactio...
Bart Peintner, Martha E. Pollack
POPL
2003
ACM
16 years 3 months ago
From symptom to cause: localizing errors in counterexample traces
There is significant room for improving users' experiences with model checking tools. An error trace produced by a model checker can be lengthy and is indicative of a symptom...
Thomas Ball, Mayur Naik, Sriram K. Rajamani