Sciweavers

1716 search results - page 273 / 344
» Proving Conditional Termination
Sort
View
119
Voted
STOC
1992
ACM
122views Algorithms» more  STOC 1992»
15 years 4 months ago
Existence and Construction of Edge Disjoint Paths on Expander Graphs
Given an expander graph G = (V, E) and a set of q disjoint pairs of vertices in V , we are interested in finding for each pair (ai, bi), a path connecting ai to bi, such that the ...
Andrei Z. Broder, Alan M. Frieze, Eli Upfal
99
Voted
CDC
2009
IEEE
131views Control Systems» more  CDC 2009»
15 years 4 months ago
Further results on plant parameter identification using continuous-time multiple-model adaptive estimators
This paper describes a deterministic approach to adaptive state and parameter estimation using a multiple model structure. In the set-up adopted, the plant of interest is described...
Vahid Hassani, A. Pedro Aguiar, António Man...
CSFW
2010
IEEE
15 years 4 months ago
Impossibility Results for Secret Establishment
—Security protocol design is a creative discipline where the solution space depends on the problem to be solved and the cryptographic operators available. In this paper, we exami...
Benedikt Schmidt, Patrick Schaller, David A. Basin
KDD
2010
ACM
300views Data Mining» more  KDD 2010»
15 years 4 months ago
Mining top-k frequent items in a data stream with flexible sliding windows
We study the problem of finding the k most frequent items in a stream of items for the recently proposed max-frequency measure. Based on the properties of an item, the maxfrequen...
Hoang Thanh Lam, Toon Calders
113
Voted
ICCCN
2007
IEEE
15 years 4 months ago
Fair Efficiency, or Low Average Delay without Starvation
Abstract-- Elastic applications are primarily interested in minimal delay achievable for their messages under current network load. In this paper, we investigate how to transmit su...
Sergey Gorinsky, Christoph Jechlitschek