Results 11 to 20 of about 1,305,670 (283)

Applying CEGAR to the Petri Net State Equation [PDF]

open access: yesLogical Methods in Computer Science, 2012
We propose a reachability verification technique that combines the Petri net state equation (a linear algebraic overapproximation of the set of reachable states) with the concept of counterexample guided abstraction refinement. In essence, we replace the
Karsten Wolf, Harro Wimmel
doaj   +1 more source

Representations of Stream Processors Using Nested Fixed Points [PDF]

open access: yesLogical Methods in Computer Science, 2009
We define representations of continuous functions on infinite streams of discrete values, both in the case of discrete-valued functions, and in the case of stream-valued functions.
Neil Ghani   +2 more
doaj   +1 more source

Gamifying Computer Science Education for Z Generation

open access: yesInformation, 2021
Generation Z members use their smart devices as part of their everyday routine. Teaching methods may need to be updated to make learning materials more interesting for this generation.
Hadeel Mohammed Jawad, Samir Tout
doaj   +1 more source

Preface to the Special Issue on “Mathematical Methods for Computer Science”

open access: yesMathematics, 2023
In the last few decades, the relationship between mathematics and algorithms has become increasingly important and influential in computer science [...]
Zhongyun Hua, Yushu Zhang
doaj   +1 more source

Editorial: Surveys in Algorithm Analysis and Complexity Theory (Special Issue)

open access: yesAlgorithms, 2023
This is a Special Issue of the open-access journal Algorithms consisting of surveys in theoretical computer science [...]
Jesper Jansson
doaj   +1 more source

Analysis of H-index and Papers Citation in Computer Science Field using K-Means Clustering Algorithm

open access: yesIraqi Journal for Computer Science and Mathematics, 2023
This paper provides an analysis of H-index and paper citations in the computer science field using K-Means Clustering Algorithm. By leveraging cutting edge visual analytics through the use of Power BI and Orange Data Mining tool with K-Means clustering ...
Omar Ibrahim Obaid
doaj   +1 more source

Fine-grained Meta-Theorems for Vertex Integrity [PDF]

open access: yesLogical Methods in Computer Science
Vertex Integrity is a graph measure which sits squarely between two more well-studied notions, namely vertex cover and tree-depth, and that has recently gained attention as a structural graph parameter.
Michael Lampis, Valia Mitsou
doaj   +1 more source

THE DESIGN OF EVOLUTIONARY ALGORITHMS: A COMPUTER SCIENCE PERSPECTIVE ON THE COMPATIBILITY OF EVOLUTION AND DESIGN

open access: yesZygon, 2022
The effectiveness of evolutionary algorithms is one of the issues discussed in The Compatibility of Evolution and Design, where it is argued that such algorithms are only effective when stringent preconditions are met.
doaj   +2 more sources

THE FORMATION OF INFORMATICS COMPETENCY FOR FUTURE COMPUTER SCIENCE TEACHERS IN THE PROCESS OF STUDYING COMPUTER MATHEMATICS

open access: yesФізико-математична освіта, 2021
Relevance and expediency of introduction of a training course of computer mathematics for students of “Secondary Education (Computer Science)” is caused by necessity of use of computer equipment with the corresponding software almost in all areas of ...
Варвара Черненко
doaj   +1 more source

Constant-delay enumeration for SLP-compressed documents [PDF]

open access: yesLogical Methods in Computer Science
We study the problem of enumerating results from a query over a compressed document. The model we use for compression are straight-line programs (SLPs), which are defined by a context-free grammar that produces a single string.
Martín Muñoz, Cristian Riveros
doaj   +1 more source

Home - About - Disclaimer - Privacy