Sciweavers

2799 search results - page 198 / 560
» computing 1998
Sort
View
COMBINATORICS
1998
102views more  COMBINATORICS 1998»
15 years 3 months ago
Inclusion-Exclusion and Network Reliability
Based on a recent improvement of the inclusion-exclusion principle, we present a new approach to network reliability problems. In particular, we give a new proof of a result of Sh...
Klaus Dohmen
MOC
1998
73views more  MOC 1998»
15 years 3 months ago
Detecting perfect powers in essentially linear time
This paper (1) gives complete details of an algorithm to compute approximate kth roots; (2) uses this in an algorithm that, given an integer n > 1, either writes n as a perfect ...
Daniel J. Bernstein
PAMI
1998
96views more  PAMI 1998»
15 years 3 months ago
On the Accuracy of Zernike Moments for Image Analysis
—In this paper, we give a detailed analysis of the accuracy of Zernike moments in terms of their discretization errors and the reconstruction power. It is found that there is an ...
Simon X. Liao, Miroslaw Pawlak
IPPS
1998
IEEE
15 years 7 months ago
Automatically Proving UNITY Safety Properties with Arrays and Quantifiers
Abstract. We address the general problem of automatically proving safety properties of reactive systems within the UNITY model. We take up a relational and set-based approach, and ...
Xavier Thirioux
SPAA
1998
ACM
15 years 6 months ago
Analyses of Load Stealing Models Based on Differential Equations
In this paper we develop models for and analyze several randomized work stealing algorithms in a dynamic setting. Our models represent the limiting behavior of systems as the numb...
Michael Mitzenmacher