找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: SOFSEM 2001: Theory and Practice of Informatics; 28th Conference on C Leszek Pacholski,Peter Ružička Conference proceedings 2001 Springer-V

[复制链接]
楼主: 指责
发表于 2025-3-27 00:08:44 | 显示全部楼层
Beyond the Turing Limit: Evolving Interactive Systemsctionality may change over time as components enter or disappear. Also, as a rule their components interact with each other and with the environment at unpredictable times and in unpredictable manners, and they evolve in ways that are not pre-programmed. Finally, although the life span of the indivi
发表于 2025-3-27 05:10:53 | 显示全部楼层
Formal Verification Methods for Industrial Hardware Designquent software releases; however, fixing hardware bugs in any shipped product is expensive. Simulation remains the dominate functional validation method, but in the last decade, formal verification (FV) has emerged as an important complementary method. We describe basic FV methods: theorem proving,
发表于 2025-3-27 05:42:42 | 显示全部楼层
How Can Computer Science Contribute to Knowledge Discoveryields including computer science. Good softwares have been demanded for various knowledge discovery tasks. For such softwares, we often need to develop efficient algorithms for handling huge data sets. . is one of the important algorithmic methods for processing huge data sets. In this paper, we exp
发表于 2025-3-27 09:54:18 | 显示全部楼层
Model Checking Communication Protocolseveral different communication protocols can be specified with this simple model. In this paper we address the problem of automatically validating protocols by verifying properties such as well-formedness and absence of deadlock. Our method is based on a representation of communicating finite-state
发表于 2025-3-27 15:46:40 | 显示全部楼层
Pipelined Decomposable BSP Computers computations. We prove that a modification of the bulk synchronous parallel (BSP) machine model, called decomposable BSP (dBSP), belongs to the class of weak parallel machines if its computational power is restricted properly. We will also correct some earlier results about pipelined parallel Turin
发表于 2025-3-27 19:50:20 | 显示全部楼层
发表于 2025-3-28 00:30:48 | 显示全部楼层
发表于 2025-3-28 04:36:51 | 显示全部楼层
发表于 2025-3-28 06:32:40 | 显示全部楼层
ADST: An Order Preserving Scalable Distributed Data Structure with Constant Access Costsputing environment made up by a collection of computers connected through a high speed network. In this paper we propose an order preserving SDDS with a worst-case constant cost for exact-search queries and a worst-case logarithmic cost for update queries. Since our technique preserves the ordering
发表于 2025-3-28 13:56:48 | 显示全部楼层
Approximative Learning of Regular Languagesave been exploited to design regular lan- guage classes called . -distinguishable which are identifiable in the limit from positive samples. Special cases of this approach are the . -reversible and terminal distinguishable languages as discussed in [., ., ., ., .].Here, we give new characterizations
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-6 01:10
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表