.ac

Results: 359273



#Item
251Greek letters / Timed automaton / Symbol / Zeta

Expected Reachability-Time Games Vojtˇech Forejt1 , Marta Kwiatkowska2 , Gethin Norman3 , and Ashutosh Trivedi2 1 Faculty of Informatics, Masaryk University, Botanick´a 68a, Brno, Czech Republic Oxford University Compu

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2010-06-15 16:26:37
252

Generating compact MTBDD-representations from Probmela specifications Frank Ciesinski1 , Christel Baier1 , Marcus Gr¨oßer1 , David Parker2 1

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2008-05-28 08:04:09
    253Computing / Network architecture / Routing protocols / Internet architecture / Data transmission / Internet Standards / Internet protocols / Routing algorithms / Routing / Link-state routing protocol / IS-IS / Open Shortest Path First

    Central Control Over Distributed Routing http://fibbing.net Stefano Vissicchio∗, Olivier Tilmans∗, Laurent Vanbever†, Jennifer Rexford‡ ∗ ∗

    Add to Reading List

    Source URL: www0.cs.ucl.ac.uk

    Language: English - Date: 2016-11-17 12:53:02
    254Finite automata / Probability theory / Probability / Timed automaton / Markov processes / Probabilistic automaton / Markov decision process / Model checking / Automata theory / Probabilistic logic

    Chapter 8 T Verification of Real-time Probabilistic Systems

    Add to Reading List

    Source URL: qav.comlab.ox.ac.uk

    Language: English - Date: 2010-04-01 04:16:38
    255Human behavior / Human sexuality / Behavior / Harassment / Sex crimes / Sexual ethics / Abuse / Rape / Sexual harassment / Harassment in the United Kingdom / Stalking / Sexual assault

    TRINITY COLLEGE Policy and Procedure on Harassment Introduction 1. Trinity College does not tolerate any form of harassment or victimisation and expects all members of the College community, its visitors and contractors

    Add to Reading List

    Source URL: www.trinity.ox.ac.uk

    Language: English - Date: 2016-01-22 12:24:58
    256Software engineering / Computer programming / Computing / Mathematical modeling / Numerical software / Constraint satisfaction / Constraint programming / AMPL / Solver / Lis / Prolog / Quadratic programming

    Cream version 1.2 Programmers Guide Naoyuki Tamura http://bach.istc.kobe-u.ac.jp/cream/ Oct. 5, 2004 Abstract

    Add to Reading List

    Source URL: bach.istc.kobe-u.ac.jp

    Language: English - Date: 2004-10-12 12:07:19
    257Concurrency control / Linearizability / Transaction processing / Model theory

    Introduction R/G Examples Brief history

    Add to Reading List

    Source URL: dream.inf.ed.ac.uk

    Language: English - Date: 2010-08-04 03:30:10
    258Mathematical analysis / Mathematics / Experiment / Information theory / Statistical theory / Measure theory / Random variable / Statistical randomness / Sigma-algebra / Probability distribution / Joint probability distribution / Probability space

    Probabilistic Point-to-Point Information Leakage Tom Chothia∗ , Yusuke Kawamoto∗ , Chris Novakovic∗ and David Parker∗ ∗ School of Computer Science University of Birmingham, Birmingham, UK Abstract—The output

    Add to Reading List

    Source URL: www.cs.bham.ac.uk

    Language: English - Date: 2017-06-07 20:45:26
    259

    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 1 Model checking probabilistic and stochastic extensions of the π -calculus

    Add to Reading List

    Source URL: qav.comlab.ox.ac.uk

    Language: English - Date: 2008-08-28 05:24:01
      260999 / Linguistics / Latin grammar / Syntax / Grammar / Language

      What to do in the event of an attack by an armed person or persons x The purpose of this guidance is to alert and not to alarm – it is not being provided in response to any specific information.

      Add to Reading List

      Source URL: www.trinity.ox.ac.uk

      Language: English - Date: 2016-01-22 12:25:12
      UPDATE