ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Articles  (74)
  • 1995-1999  (63)
  • 1915-1919
  • Computer Science  (61)
  • Technology  (11)
  • Sociology
Collection
  • Articles  (74)
Years
Year
Journal
  • 1
    Electronic Resource
    Electronic Resource
    Springer
    Formal methods in system design 14 (1999), S. 257-271 
    ISSN: 1572-8102
    Keywords: communication protocols ; queues ; symbolic verification ; BDDs ; state explosion ; state-space exploration ; model checking
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science
    Notes: Abstract Symbolic verification based on Binary Decision Diagrams (BDDs) has proven to be a powerful technique for ensuring the correctness of digital hardware. In contrast, BDDs have not caught on as widely for software verification, partly because the data types used in software are more complicated than those used in hardware. In this work, we propose an extension of BDDs for dealing with dynamic data structures. Specifically, we focus on queues, since they are commonly used in modeling communication protocols. We introduce Queue BDDs (QBDDs), which include all the power of BDDs while also providing an efficient representation of queue contents. Experimental results show that QBDDs are well-suited for the verification of communication protocols.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 2
    ISSN: 1572-8102
    Keywords: The computer industry, standards, Futurebus+ ; multiple data stream architectures, interconnection architectures ; network protocols, protocol verification
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science
    Notes: Abstract We used a hardware description language to construct a formal model of the cache coherence protocol described in the IEEE Futurebus+standard. By applying temporal logic model checking techniques, we found errors in the standard. The result of our project is a concise, comprehensible and unambiguous model of the protocol that should be useful both to the Futurebus+Working Group members, who are responsible for the protocol, and to actual designers of Futurebus+boards.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 3
    ISSN: 1572-8196
    Source: Springer Online Journal Archives 1860-2000
    Topics: Electrical Engineering, Measurement and Control Technology , Computer Science
    Notes: Abstract Future computing environments will free the user from the constraints of the desktop. Applications for a mobile environment should take advantage of contextual information, such as position, to offer greater services to the user. In this paper, we present the Cyberguide project, in which we are building prototypes of a mobile context‐aware tour guide. Knowledge of the user's current location, as well as a history of past locations, are used to provide more of the kind of services that we come to expect from a real tour guide. We describe the architecture and features of a variety of Cyberguide prototypes developed for indoor and outdoor use on a number of different hand‐held platforms. We also discuss the general research issues that have emerged in our context‐aware applications development in a mobile environment.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 4
    Electronic Resource
    Electronic Resource
    Springer
    Computational complexity 5 (1995), S. 1-23 
    ISSN: 1420-8954
    Keywords: Machine learning ; computational learning theory ; on-line learning ; linear functions ; worst-case loss bounds ; adaptive filter theory ; 68T05
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science
    Notes: Abstract We present an algorithm for the on-line learning of linear functions which is optimal to within a constant factor with respect to bounds on the sum of squared errors for a worst case sequence of trials. The bounds are logarithmic in the number of variables. Furthermore, the algorithm is shown to be optimally robust with respect to noise in the data (again to within a constant factor).
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 5
    Electronic Resource
    Electronic Resource
    Springer
    Theory of computing systems 29 (1996), S. 423-449 
    ISSN: 1433-0490
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science
    Notes: Abstract The low and high hierarchies within NP were introduced by Schöning in order to classify sets in NP. It is not known whether the low and high hierarchies include all sets in NP. In this paper, using the circuit lower-bound techniques of Håstad and Ko, we construct an oracle set relative to which UP contains a language that is not in any level of the low hierarchy and such that no language in UP is in any level of the high hierarchy. Thus, in order to prove that UP contains languages that are in the high hierarchy or that UP is contained in the low hierarchy, it is necessary to use nonrelativizable proof techniques. Since it is known that UPA is low for PPA for all setsA, our result also shows that the interaction between UP and PP is crucial for the lowness of UP for PP; changing the base class to any level of the polynomial-time hierarchy destroys the lowness of UP.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 6
    Electronic Resource
    Electronic Resource
    Springer
    Theory of computing systems 28 (1995), S. 299-327 
    ISSN: 1433-0490
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science
    Notes: Abstract Based on the ε- and Δ-classes of the polynomial-time hierarchy, Schöning [S1], [S3]introduced low and high hierarchies within NP Several classes of sets have been located in the bottom few levels of these hierarchies [S1], [S3], [KS], [BB], [BS2], [AH]. Most results placing sets in the Δ-levels of the low hierarchy are related to sparse sets, and the proof techniques employed involve deterministic enumeration of sparse sets. Balcàzaret al. [BBS]and Allender and Hemachandra [AH] introduced extended low hierarchies, involving sets outside of NP, based on the ε- and gD-classes of the polynomial-time hierarchy. Several classes of sets have been located in the Δ-levels of these hierarchies as well, and once again most such results involve sparse sets. In this paper we introduce a refinement of the low and high hierarchies and of the extended low hierarchies. Our refinement is based on the Θ-classes of the polynomial-time hierarchy. We show that almost all of the classes of sets that are known to belong to the Δ-levels of the low and extended low hierarchies actually belong to the newly defined Θ-levels of these hierarchies. Our proofs use Kadin's [K1]technique of computing the census of a sparse set first, followed by a nondeterministic enumeration of the set. This leads to the sharper lowness results. We also consider the optimality of these new lowness results. For sets in the Θ-levels of the low hierarchy we have oracle results indicating that substantially stronger results are not possible through use of Kadin's technique. For sets in the Θ-classes of the extended low hierarchy we have tight absolute lower bounds; that is, lower bounds without oracles. These bounds are slightly stronger than similar bounds appearing in [AH].
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 7
    Electronic Resource
    Electronic Resource
    Springer
    Journal of intelligent and robotic systems 14 (1995), S. 89-103 
    ISSN: 1573-0409
    Keywords: Redundant manipulators ; impedance control ; force control ; sensor fusion ; supervised autonomy ; task space
    Source: Springer Online Journal Archives 1860-2000
    Topics: Computer Science , Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics
    Notes: Abstract Control of a redundant manipulator based on an impedance-control framework with multiple simultaneous control sources is described. Each control source provides a different behavior type. An application is decomposed into multiple simultaneous behaviors whose resultant behavior will provide the motion necessary to execute the task. The simultaneous control inputs are merged using impedance control to compute a resultant command to the manipulator. The task space of each behavior can have the dimensionality of the mechanism being controlled. Control of a seven-degree-of-freedom manipulator is described here with an available task space for each behavior of dimensionality seven.
    Type of Medium: Electronic Resource
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 8
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 9
    facet.materialart.
    Unknown
    Detroit, Mich. : Periodicals Archive Online (PAO)
    Technology and Culture. 36:3 (1995:July) 723 
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 10
    facet.materialart.
    Unknown
    London : Periodicals Archive Online (PAO)
    Journal of the Economic and Social History of the Orient. 38 (1995) 120 
    ISSN: 0022-4995
    Topics: Ethnic Sciences , History , Sociology , Economics
    Description / Table of Contents: EAST ASIA
    Notes: SUBJECTS
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...