• No results found

worst-case time bound

Algorithm Design   John Kleinberg   va Tardos pdf

Algorithm Design John Kleinberg va Tardos pdf

... Worst-Case Running Times and Brute-Force Search To begin with, we will focus on analyzing the worst-case running time: we will look for a bound on the largest possible running time the a[r] ...

432

Worst Case Reliability Prediction Based on a Prior Estimate of Residual Defects

Worst Case Reliability Prediction Based on a Prior Estimate of Residual Defects

... quantitative bound on the failure intensity after any period of execution and correction and this bound always decreases with increasing execution ...

10

On Computing the Worst case H∞ Performance of Lur'e Systems with Uncertain Time invariant Delays

On Computing the Worst case H∞ Performance of Lur'e Systems with Uncertain Time invariant Delays

... In the recent years, many studies have applied Lyapunov-Krasovskii Theorem [2] to develop absolute stability analysis for LSTD. In particular, various types of Lyapunov-Krasovskii functional (LKF) are used to formulate ...

20

Analytical Bounding Data Cache Behavior for Real-Time Systems

Analytical Bounding Data Cache Behavior for Real-Time Systems

... a time starting with the inner-most ...WCET bound. The remaining loop iterations are then guaranteed to be bound by this fixpoint as well ...overall bound for an inner loop can be used directly ...

149

Toward coexistence and sharing between IMT-­advanced and existing fixed systems

Toward coexistence and sharing between IMT-­advanced and existing fixed systems

... challenge case for two ...in case interference from IMT-Advanced toward FWA, The only form of interference modeled in this case is ACI that arises from the ACLR from BS transmissions in the IMT- ...

18

Worst case dimensioning of wireless sensor networks under uncertain topologies

Worst case dimensioning of wireless sensor networks under uncertain topologies

... limited case, though) these three cri- teria often ...as worst case topology for all of the above metrics, since it maximizes the effect of burstiness increase as the sensed data travels towards the ...

6

Worst Case Synchronous Grammar Rules

Worst Case Synchronous Grammar Rules

... We have shown in the exponent in the complex- ity of polynomial-time parsing algorithms for syn- chronous context-free grammars grows linearly with the length of the grammar rules. While it is very expensive ...

8

Non Projective Dependency Parsing in Expected Linear Time

Non Projective Dependency Parsing in Expected Linear Time

... the time complexity for deterministic parsing from linear to quadratic in the worst case, but empirical estimates based on treebank data show that the expected running time is in fact linear ...

9

On the solution of min-max problems in robust optimization

On the solution of min-max problems in robust optimization

... the case of function ...the case the number of local maxima is low or d does not change the location of the maxima, then the use of the simple function values is sufficient as can be seen if Figures 2 where ...

6

A Total Need based Resource Reservation Technique for Effective Resource Management

A Total Need based Resource Reservation Technique for Effective Resource Management

... The effect of increase in the process load over the frequency of the deadlock can be seen in the figure 1. The Banker’s algorithm is complete Deadlock Avoidance approach, wherein it ensures that system is always in safe ...

6

Modelling of the parametric yield in decananometer SRAM-Arrays

Modelling of the parametric yield in decananometer SRAM-Arrays

... the worst case distance, an optimiza- tion problem in a multidimensional space must be ...the Worst Case Distance [Antreich, ...the worst case distance analysis first with just ...

5

Constant-Round  Concurrent  Zero  Knowledge  From  Falsifiable  Assumptions

Constant-Round Concurrent Zero Knowledge From Falsifiable Assumptions

... running- time of the machine M selected by the ...as time-representation invariance—namely, that whether the verifier accepts a proof of a statement x does not depend on how the time-bound ...

37

CCG Parsing Algorithm with Incremental Tree Rotation

CCG Parsing Algorithm with Incremental Tree Rotation

... the worst case the method will reach the bottom of the tree, but often only 3 or 4 nodes need to be transformed to make the tree perfectly the right branching The worst case complexity of ...

12

Searching with Imperfect Information

Searching with Imperfect Information

... This paper is centred around the following question: What is the influence of a non-optimal seeker on the cow path problem? To answer this we first apply the linear spiral search algorithm on the cow path problem with a ...

8

The Performance of ECC Algorithms in DNSSEC: A Model based Approach

The Performance of ECC Algorithms in DNSSEC: A Model based Approach

... per outgoing query the most amount of validations need to be performed. This value of Q lies between 1422.6 and 1525.6 for AMS and UTR respectively. This means that the volume of outgoing queries needs to grow by a ...

88

Worst-Case  to  Average-Case  Reductions  for  Module  Lattices

Worst-Case to Average-Case Reductions for Module Lattices

... Abstract. Most lattice-based cryptographic schemes are built upon the assumed hardness of the Short Integer Solution (SIS) and Learning With Errors (LWE) problems. Their efficiencies can be drastically improved by ...

29

Compact  Accumulator  using  Lattices

Compact Accumulator using Lattices

... We have provided the first lattice-based construction of a one-way accumulator scheme and proved its security from hardness assumption of the SIS problem (which is itself implied by worst-case lattice ...

11

Finite volume analysis of temperature effects induced by active MRI implants: 2. Defects on active MRI implants causing hot spots

Finite volume analysis of temperature effects induced by active MRI implants: 2. Defects on active MRI implants causing hot spots

... A x (i) is the contact area in both directions of the cylinder axis (from any index j to j-1 and to j+1) whereas A r (i) is the contact area in radial direction from index i to i+1. The contact area in radial direction ...

20

Predicting Worst-Case Execution Time Trends in Long-Lived Real-Time Systems

Predicting Worst-Case Execution Time Trends in Long-Lived Real-Time Systems

... tion time in a short period can only produce a high-water ...the worst-case execution scenario (including the worst-case execution path, worst-case input data, and the ...

16

A comparison of worst case performance of priority queues used in Dijkstra's shortest path algorithm

A comparison of worst case performance of priority queues used in Dijkstra's shortest path algorithm

... 5.2 Worst Case Graph In order to ensure the maximum possible number of decreasekey operations and worst case time for a decreasekey operation on each data structure it was necessary to f[r] ...

49

Show all 10000 documents...

Related subjects