Results 11 to 20 of about 1,305,670 (283)
Applying CEGAR to the Petri Net State Equation [PDF]
We propose a reachability verification technique that combines the Petri net state equation (a linear algebraic overapproximation of the set of reachable states) with the concept of counterexample guided abstraction refinement. In essence, we replace the
Karsten Wolf, Harro Wimmel
doaj +1 more source
Representations of Stream Processors Using Nested Fixed Points [PDF]
We define representations of continuous functions on infinite streams of discrete values, both in the case of discrete-valued functions, and in the case of stream-valued functions.
Neil Ghani +2 more
doaj +1 more source
Gamifying Computer Science Education for Z Generation
Generation Z members use their smart devices as part of their everyday routine. Teaching methods may need to be updated to make learning materials more interesting for this generation.
Hadeel Mohammed Jawad, Samir Tout
doaj +1 more source
Preface to the Special Issue on “Mathematical Methods for Computer Science”
In the last few decades, the relationship between mathematics and algorithms has become increasingly important and influential in computer science [...]
Zhongyun Hua, Yushu Zhang
doaj +1 more source
Editorial: Surveys in Algorithm Analysis and Complexity Theory (Special Issue)
This is a Special Issue of the open-access journal Algorithms consisting of surveys in theoretical computer science [...]
Jesper Jansson
doaj +1 more source
Analysis of H-index and Papers Citation in Computer Science Field using K-Means Clustering Algorithm
This paper provides an analysis of H-index and paper citations in the computer science field using K-Means Clustering Algorithm. By leveraging cutting edge visual analytics through the use of Power BI and Orange Data Mining tool with K-Means clustering ...
Omar Ibrahim Obaid
doaj +1 more source
Fine-grained Meta-Theorems for Vertex Integrity [PDF]
Vertex Integrity is a graph measure which sits squarely between two more well-studied notions, namely vertex cover and tree-depth, and that has recently gained attention as a structural graph parameter.
Michael Lampis, Valia Mitsou
doaj +1 more source
The effectiveness of evolutionary algorithms is one of the issues discussed in The Compatibility of Evolution and Design, where it is argued that such algorithms are only effective when stringent preconditions are met.
doaj +2 more sources
Relevance and expediency of introduction of a training course of computer mathematics for students of “Secondary Education (Computer Science)” is caused by necessity of use of computer equipment with the corresponding software almost in all areas of ...
Варвара Черненко
doaj +1 more source
Constant-delay enumeration for SLP-compressed documents [PDF]
We study the problem of enumerating results from a query over a compressed document. The model we use for compression are straight-line programs (SLPs), which are defined by a context-free grammar that produces a single string.
Martín Muñoz, Cristian Riveros
doaj +1 more source

