# A melhor ferramenta para a sua pesquisa, trabalho e TCC!

Página 1 dos resultados de 10724 itens digitais encontrados em 0.085 segundos

## Using hyperbolic tangents in integer factoring

Fonte: Massachusetts Institute of Technology
Publicador: Massachusetts Institute of Technology

Tipo: Tese de Doutorado
Formato: 45 leaves; 5137272 bytes; 5137031 bytes; application/pdf; application/pdf

Português

Relevância na Pesquisa

75.49%

#Electrical Engineering and Computer Science.#Factorization (Mathematics)#Hyperbola#Number theory#Algorithms#Parallel processing (Electronic computers)

by Ron Yair Pinter.; Thesis (M.S.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1980.; MICROFICHE COPY AVAILABLE IN ARCHIVES AND ENGINEERING; Bibliography: leaf 45.

Link permanente para citações:

## Practical robustness measures in multivariable control system analysis

Fonte: Massachusetts Institute of Technology
Publicador: Massachusetts Institute of Technology

Tipo: Tese de Doutorado
Formato: xii, 264 leaves; 14443831 bytes; 14443588 bytes; application/pdf; application/pdf

Português

Relevância na Pesquisa

65.49%

#Electrical Engineering and Computer Science.#System analysis#Feedback control systems Stability#Variables (Mathematics)

by Norman August Lehtomaki.; Thesis (Ph.D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1981.; MICROFICHE COPY AVAILABLE IN ARCHIVES AND ENGINEERING.; Includes bibliographical references.

Link permanente para citações:

## Optimal dynamic routing in an unreliable queuing system

Fonte: Massachusetts Institute of Technology
Publicador: Massachusetts Institute of Technology

Tipo: Tese de Doutorado
Formato: 141 [i.e. 140] leaves; 6967694 bytes; 6967457 bytes; application/pdf; application/pdf

Português

Relevância na Pesquisa

65.49%

#Electrical Engineering and Computer Science.#Queuing theory#Dynamic programming#Iterative methods (Mathematics)#Systems engineering#Markov processes#Uncertainty (Information theory)

by John Nikolaos Tsitsiklis.; Thesis (M.S.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1981.; MICROFICHE COPY AVAILABLE IN ARCHIVES AND ENGINEERING.; Bibliography: leaves 120-124.

Link permanente para citações:

## Multiple time scale approach to heirarchical aggregation of linear systems and finite state Markov processes

Fonte: Massachusetts Institute of Technology
Publicador: Massachusetts Institute of Technology

Tipo: Tese de Doutorado
Formato: 332 p.; 12967752 bytes; 12967508 bytes; application/pdf; application/pdf

Português

Relevância na Pesquisa

65.49%

#Electrical Engineering and Computer Science.#Large scale systems#Markov processes#Perturbation (Mathematics)#Asymptotic expansions#Interconnected electric utility systems

by Marcel Coderch i Collell.; Thesis (Ph.D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1982.; MICROFICHE COPY AVAILABLE IN ARCHIVES AND ENGINEERING.; Bibliography: leaves 328-332.

Link permanente para citações:

## Iterative algorithms for optimal signal reconstruction and parameter identification given noisy and incomplete data

Fonte: Massachusetts Institute of Technology
Publicador: Massachusetts Institute of Technology

Tipo: Tese de Doutorado
Formato: 2 v. (466 leaves); 35604417 bytes; 35604170 bytes; application/pdf; application/pdf

Português

Relevância na Pesquisa

65.49%

#Electrical Engineering and Computer Science.#Signal processing Digital techniques#Estimation theory#Iterative methods (Mathematics)#Entropy (Information theory)#Stochastic processes

by Bruce R. Musicus.; Thesis (Ph.D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1982.; MICROFICHE COPY AVAILABLE IN ARCHIVES AND ENGINEERING.; Vita.; Includes bibliographical references.

Link permanente para citações:

## NPL : a graphical programming language for motor control and its application to bipedal walking; Neuronal Programming Language : a graphical programming language for motor control and its application to bipedal walking

Fonte: Massachusetts Institute of Technology
Publicador: Massachusetts Institute of Technology

Tipo: Tese de Doutorado
Formato: 126 p.; 5937472 bytes; 5937281 bytes; application/pdf; application/pdf

Português

Relevância na Pesquisa

65.49%

Current methods for bipedal walking control include playback of recorded joint motion and the derivation of dynamic equations to map desired forces at the body to the required torques at the joints. Both methods require a significant amount of up-front knowledge about the structure and characteristics of the robot. This thesis presents an alternative method of control that removes the interdependence of the joint torques and simplifies the mathematics considerably. The simplification allows a programmer to create and tune a bipedal walk controller without requiring a complete model of the dynamics. The controller is implemented in a graphical programming language similar to fuzzy logic and neural networks, in which the algorithm is contained in the structure of the nodes rather than in the weights of the connections. The language and its development environment are specifically designed to assist the programmer to create and debug the algorithm in a live environment.; by Michael Alan Wessler.; Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2002.; Includes bibliographical references (p. 123-126).

Link permanente para citações:

## Spectral partitioning, eigenvalue bounds, and circle packings for graphs of bounded genus

Fonte: Massachusetts Institute of Technology
Publicador: Massachusetts Institute of Technology

Tipo: Tese de Doutorado
Formato: 39 leaves; 1794456 bytes; 1796720 bytes; application/pdf; application/pdf

Português

Relevância na Pesquisa

65.49%

In this paper, we address two longstanding questions about finding good separators in graphs of bounded genus and degree: 1. It is a classical result of Gilbert, Hutchinson, and Tarjan [12] that one can find asymptotically optimal separators on these graphs if he is given both the graph and an embedding of it onto a low genus surface. Does there exist a simple, efficient algorithm to find these separators given only the graph and not the embedding? 2. In practice, spectral partitioning heuristics work extremely well on these graphs. Is there a theoretical reason why this should be the case? We resolve these two questions by showing that a simple spectral algorithm finds separators of cut ratio O(sqrt(g/n)) and vertex bisectors of size O(sqrt(gn)) in these graphs, both of which are optimal. As our main technical lemma, we prove an O(g/n) bound on the second smallest eigenvalue of the Laplacian of such graphs and show that this is tight, thereby resolving a conjecture of Spielman and Teng. While this lemma is essentially combinatorial in nature, its proof comes from continuous mathematics, drawing on the theory of circle packings and the geometry of compact Riemann surfaces.; by Jonathan Kelner.; Thesis (S.M.)--Massachusetts Institute of Technology...

Link permanente para citações:

## Epidemic modeling techniques for smallpox

Fonte: Massachusetts Institute of Technology
Publicador: Massachusetts Institute of Technology

Tipo: Tese de Doutorado
Formato: 121 p.; 5681061 bytes; 5688592 bytes; application/pdf; application/pdf

Português

Relevância na Pesquisa

65.49%

Infectious disease models predict the impact of outbreaks. Discrepancies between model predictions stem from both the disease parameters used and the underlying mathematics of the models. Smallpox has been modeled extensively in recent years to determine successful response guidelines for a future outbreak. Five models, which range in fidelity, were created for this thesis in an attempt to reveal the differences inherent in the mathematical techniques used in the models. The disease parameters were standardized across all models. Predictions for various outbreak scenarios are given, and the strengths and weaknesses of each modeling technique are discussed. The mixing strategy used greatly affects the predictions of the models. The results gathered indicate that mass vaccination should be considered as a primary response technique in the event of a future smallpox outbreak.; by Cory Y. McLean.; Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2004.; Includes bibliographical references (p. 119-121).

Link permanente para citações:

## New geometric techniques for linear programming and graph partitioning

Fonte: Massachusetts Institute of Technology
Publicador: Massachusetts Institute of Technology

Tipo: Tese de Doutorado
Formato: 82 leaves

Português

Relevância na Pesquisa

65.49%

In this thesis, we advance a collection of new geometric techniques for the analysis of combinatorial algorithms. Using these techniques, we resolve several longstanding questions in the theory of linear programming, polytope theory, spectral graph theory, and graph partitioning. The thesis consists of two main parts. In the first part, which is joint work with Daniel Spielman, we present the first randomized polynomial-time simplex algorithm for linear programming, answering a question that has been open for over fifty years. Like the other known polynomial-time algorithms for linear programming, its running time depends polynomially on the number of bits used to represent its input. To do this, we begin by reducing the input linear program to a special form in which we merely need to certify boundedness of the linear program. As boundedness does not depend upon the right-hand-side vector, we run a modified version of the shadow-vertex simplex method in which we start with a random right-hand-side vector and then modify this vector during the course of the algorithm. This allows us to avoid bounding the diameter of the original polytope.; (cont.) Our analysis rests on a geometric statement of independent interest: given a polytope ... in isotropic position...

Link permanente para citações:

## An innovative approach to teaching structural induction for computer science

Fonte: FIU Digital Commons
Publicador: FIU Digital Commons

Tipo: Artigo de Revista Científica

Português

Relevância na Pesquisa

65.58%

Proofs by induction are central to many computer science areas such as data structures, theory of computation, programming languages, program efficiency-time complexity, and program correctness. Proofs by induction can also improve students’ understanding and performance of computer science concepts such as programming languages, algorithm design, and recursion, as well as serve as a medium for teaching them. ^ Even though students are exposed to proofs by induction in many courses of their curricula, they still have difficulties understanding and performing them. This impacts the whole course of their studies, since proofs by induction are omnipresent in computer science. Specifically, students do not gain conceptual understanding of induction early in the curriculum and as a result, they have difficulties applying it to more advanced areas later on in their studies. ^ The goal of my dissertation is twofold: (1) identifying sources of computer science students’ difficulties with proofs by induction, and (2) developing a new approach to teaching proofs by induction by way of an interactive and multimodal electronic book (e-book). For the first goal, I undertook a study to identify possible sources of computer science students’ difficulties with proofs by induction. Its results suggest that there is a close correlation between students’ understanding of inductive definitions and their understanding and performance of proofs by induction. For designing and developing my e-book...

Link permanente para citações:

## Refinement composition using doubly labeled transition graphs

Fonte: Monterey, California. Naval Postgraduate School
Publicador: Monterey, California. Naval Postgraduate School

Tipo: Tese de Doutorado
Formato: xxii, 53 p.

Português

Relevância na Pesquisa

75.57%

Process Algebra forms a cornerstone in the formal methods area of Computer Science. Among the more widely used approaches is Milner's Communication and Concurrency Systems (CCS). Recently CCS has been extended by Schmidt and Bibighaus through the introduction of Doubly Labeled Transition Systems. This framework has enhanced the model's ability to capture security and availability properties. In this thesis we reformulate, simplify, and extend Bibighaus' work using a graph theoretic framework. The intent is that this abstract mathematical view will make the results more accessible and stimulate additional research. Existing definitions and theorems are redefined and proved using Labeled and Doubly Labeled Transition Graphs (LTG and DLTG). CCS simulation concepts are recast as graph morphisms and the notion of abstraction and refinement are explained through the use of graphs. Bibighaus' work is extended by showing how to carry out non-atomic DLTG refinement, and by developing a form of graph composition involving graph refinements that share a common abstract graph. This type of composition is proven to always be possible with DLTG refinements, and we demonstrate that the composite graph is both a refinement of the abstract graph, and an abstract graph for the refinements from which it was made.; US Navy (USN) author.

Link permanente para citações:

## A computer science version of Godel's theorem

Fonte: Monterey, California. Naval Postgraduate School.
Publicador: Monterey, California. Naval Postgraduate School.

Tipo: Relatório
Formato: 16 p. ; 28 cm.

Português

Relevância na Pesquisa

75.53%

#ARMED FORCES--ACQUISITION.#Godel's Theorem, halting problem, incompleteness theorem, computability, formalism, decidability, paradoxes, decision problems, foundations of mathematics, logic

We present a simplified proof of Godel's theorem by appealing to well known programming concepts. The significance of Godel's result to computer science, mathematics and logic is discussed.; Prepared for: Chief of Naval Research; Arlington, Virginia 22217.; http://archive.org/details/computersciencev00macl; N0001482WR20043; NA

Link permanente para citações:

## Distributed routing

Fonte: Massachusetts Institute of Technology
Publicador: Massachusetts Institute of Technology

Tipo: Tese de Doutorado
Formato: 85 leaves; 3916032 bytes; 3915790 bytes; application/pdf; application/pdf

Português

Relevância na Pesquisa

65.51%

#Electrical Engineering and Computer Science.#Computer networks#Electronic data processing Distributed processing#Algorithms#Iterative methods (Mathematics)

by Art O'Leary.; Thesis (Ph.D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1981.; MICROFICHE COPY AVAILABLE IN ARCHIVES AND ENGINEERING.; Bibliography: leaf 85.

Link permanente para citações:

## Applying integer programming techniques to find minimum integer weights of voting games

Fonte: Massachusetts Institute of Technology
Publicador: Massachusetts Institute of Technology

Tipo: Tese de Doutorado
Formato: 76 p.; 3809395 bytes; 3817408 bytes; application/pdf; application/pdf

Português

Relevância na Pesquisa

75.52%

Using concepts from computer science and mathematics I develop three algorithms to find the minimum integer weights for voting games. Games with up to at least 17 players can be solved in a reasonable amount of time. First, coalitions are mapped to constraints, reducing the problem to constraint optimization. The optimization techniques used are Gomory's all-integer simplex algorithm and a variant of the popular integer programming method branch and bound. Theoretical results include that minimum integer weights are not unique and a confirmation of a prior result that minimum integer weights are proportional to a priori seat share. Thus, these algorithms can be useful for researchers evaluating the differences between proportional bargaining models and formateur models. The running times of the different algorithms are contrasted and analyzed for potential improvements.; by Aaron B. Strauss.; Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2003.; Includes bibliographical references (p. 73-76).

Link permanente para citações:

## A theory and toolkit for the mathematics of privacy : methods for anonymizing data while minimizing information loss

Fonte: Massachusetts Institute of Technology
Publicador: Massachusetts Institute of Technology

Tipo: Tese de Doutorado
Formato: 86 leaves; 14904672 bytes; 14904307 bytes; application/pdf; application/pdf

Português

Relevância na Pesquisa

75.49%

Privacy laws are an important facet of our society. But they can also serve as formidable barriers to medical research. The same laws that prevent casual disclosure of medical data have also made it difficult for researchers to access the information they need to conduct research into the causes of disease. But it is possible to overcome some of these legal barriers through technology. The US law known as HIPAA, for example, allows medical records to be released to researchers without patient consent if the records are provably anonymized prior to their disclosure. It is not enough for records to be seemingly anonymous. For example, one researcher estimates that 87.1% of the US population can be uniquely identified by the combination of their zip, gender, and date of birth - fields that most people would consider anonymous. One promising technique for provably anonymizing records is called k-anonymity. It modifies each record so that it matches k other individuals in a population - where k is an arbitrary parameter. This is achieved by, for example, changing specific information such as a date of birth, to a less specific counterpart such as a year of birth.; (cont.) Previous studies have shown that achieving k-anonymity while minimizing information loss is an NP-hard problem; thus a brute force search is out of the question for most real world data sets. In this thesis...

Link permanente para citações:

## Additive combinatorics with a view towards computer science and cryptography: An exposition

Fonte: Universidade Cornell
Publicador: Universidade Cornell

Tipo: Artigo de Revista Científica

Português

Relevância na Pesquisa

65.59%

#Mathematics - Combinatorics#Computer Science - Cryptography and Security#Mathematics - Number Theory

Recently, additive combinatorics has blossomed into a vibrant area in
mathematical sciences. But it seems to be a difficult area to define - perhaps
because of a blend of ideas and techniques from several seemingly unrelated
contexts which are used there. One might say that additive combinatorics is a
branch of mathematics concerning the study of combinatorial properties of
algebraic objects, for instance, Abelian groups, rings, or fields. This
emerging field has seen tremendous advances over the last few years, and has
recently become a focus of attention among both mathematicians and computer
scientists. This fascinating area has been enriched by its formidable links to
combinatorics, number theory, harmonic analysis, ergodic theory, and some other
branches; all deeply cross-fertilize each other, holding great promise for all
of them! In this exposition, we attempt to provide an overview of some
breakthroughs in this field, together with a number of seminal applications to
sundry parts of mathematics and some other disciplines, with emphasis on
computer science and cryptography.; Comment: 37 pages. In Proceedings of the International Number Theory
Conference in Memory of Alf van der Poorten, to appear

Link permanente para citações:

## Homotopy invariants of higher dimensional categories and concurrency in computer science

Fonte: Universidade Cornell
Publicador: Universidade Cornell

Tipo: Artigo de Revista Científica

Português

Relevância na Pesquisa

65.58%

#Mathematics - Category Theory#Computer Science - Other Computer Science#Mathematics - Algebraic Topology#18G, 55U

The strict globular $\omega$-categories formalize the execution paths of a
parallel automaton and the homotopies between them. One associates to such (and
any) $\omega$-category $\C$ three homology theories. The first one is called
the globular homology. It contains the oriented loops of $\C$. The two other
ones are called the negative (resp. positive) corner homology. They contain in
a certain manner the branching areas of execution paths or negative corners
(resp. the merging areas of execution paths or positive corners) of $\C$. Two
natural linear maps called the negative (resp. the positive) Hurewicz morphism
from the globular homology to the negative (resp. positive) corner homology are
constructed. We explain the reason why these constructions allow to
reinterprete some geometric problems coming from computer science.; Comment: 54 pages, 1 eps figure, LaTeX2e ; v2 construction of negative and
positive Hurewicz morphisms added, corrected reference ; v3 reorganized paper
for a better understanding ; v4 final version to appear in Mathematical
Structure in Computer Science ; v5 last minute correction (very minor
changes)

Link permanente para citações:

## Phase Transition in a Random Fragmentation Problem with Applications to Computer Science

Fonte: Universidade Cornell
Publicador: Universidade Cornell

Tipo: Artigo de Revista Científica

Publicado em 02/05/2002
Português

Relevância na Pesquisa

65.49%

#Condensed Matter - Statistical Mechanics#Condensed Matter - Disordered Systems and Neural Networks#Computer Science - Data Structures and Algorithms#Mathematics - Probability

We study a fragmentation problem where an initial object of size x is broken
into m random pieces provided x>x_0 where x_0 is an atomic cut-off.
Subsequently the fragmentation process continues for each of those daughter
pieces whose sizes are bigger than x_0. The process stops when all the
fragments have sizes smaller than x_0. We show that the fluctuation of the
total number of splitting events, characterized by the variance, generically
undergoes a nontrivial phase transition as one tunes the branching number m
through a critical value m=m_c. For mm_c they are anomalously large and non-Gaussian. We apply this general
result to analyze two different search algorithms in computer science.; Comment: 5 pages RevTeX, 3 figures (.eps)

Link permanente para citações:

## Scienceography: the study of how science is written

Fonte: Universidade Cornell
Publicador: Universidade Cornell

Tipo: Artigo de Revista Científica

Português

Relevância na Pesquisa

65.48%

Scientific literature has itself been the subject of much scientific study,
for a variety of reasons: understanding how results are communicated, how ideas
spread, and assessing the influence of areas or individuals. However, most
prior work has focused on extracting and analyzing citation and stylistic
patterns. In this work, we introduce the notion of 'scienceography', which
focuses on the writing of science. We provide a first large scale study using
data derived from the arXiv e-print repository. Crucially, our data includes
the "source code" of scientific papers-the LaTEX source-which enables us to
study features not present in the "final product", such as the tools used and
private comments between authors. Our study identifies broad patterns and
trends in two example areas-computer science and mathematics-as well as
highlighting key differences in the way that science is written in these
fields. Finally, we outline future directions to extend the new topic of
scienceography.; Comment: 13 pages,16 figures. Sixth International Conference on FUN WITH
ALGORITHMS, 2012

Link permanente para citações:

## The skewness of computer science

Fonte: Universidade Cornell
Publicador: Universidade Cornell

Tipo: Artigo de Revista Científica

Português

Relevância na Pesquisa

65.57%

Computer science is a relatively young discipline combining science,
engineering, and mathematics. The main flavors of computer science research
involve the theoretical development of conceptual models for the different
aspects of computing and the more applicative building of software artifacts
and assessment of their properties. In the computer science publication
culture, conferences are an important vehicle to quickly move ideas, and
journals often publish deeper versions of papers already presented at
conferences. These peculiarities of the discipline make computer science an
original research field within the sciences, and, therefore, the assessment of
classical bibliometric laws is particularly important for this field. In this
paper, we study the skewness of the distribution of citations to papers
published in computer science publication venues (journals and conferences). We
find that the skewness in the distribution of mean citedness of different
venues combines with the asymmetry in citedness of articles in each venue,
resulting in a highly asymmetric citation distribution with a power law tail.
Furthermore, the skewness of conference publications is more pronounced than
the asymmetry of journal papers. Finally, the impact of journal papers...

Link permanente para citações: