In this paper we consider some numerical issues in computing solutions to networks of stochastic automata (SAN). In particular our concern is with keeping the amount of computation per iteration to a minimum, since iterative methods appear to be the most effective in determining numerical solutions. In a previous paper we presented complexity results concerning the vector-descriptor multiplication phase of the analysis. In this paper our concern is with implementation details. We experiment with the size and sparsity of individual automata; with the ordering of the automata; with the percentage and location of functional elements; with the occurrence of different types of synchronizing events and with the occurrence of cyclic dependencies w...
In this paper we present GDS, a new approach for code optimization within the context of embedded sy...
Projet MEVALA queueing system is considered, with a large number $N$ of identical infinite-buffer FC...
We address in this paper the verification of imperative programs with recursion. Our approach consis...
In this paper we study the asymptotic behavior of the tail of the stationary backlog distribution in...
We give a survey on packages for multiple precision interval arithmetic, with the main focus on thre...
Projet MEVALRandom grammars were introduced in computer science, but the study of their thermodynami...
We present an assertional approach to prove properties of Alpha programs. Alpha is a functional lang...
We consider weak eulerian evolution of domains through the convection of a measurable set by a nonsm...
Rising complexity and performances of embedded systems, shortening time-to-ma- rket demands for digi...
Colloque avec actes et comité de lecture.Real-world problems are often characterized by the large si...
This paper presents integer multiplication and division operators dedicated to Virtex-II FPGAs from ...
Wireless technologies and the deployment of mobile and nomadic services are driving the emergence of...
We deal with a numerical method for HJB equations coming from optimal control problems with state co...
In this thesis we study quenching and blowup problems for reaction diffusion equations with Cauchy-D...
In this report, we present an estimation of the one-hop delay in 802.11 wireless network using the O...
In this paper we present GDS, a new approach for code optimization within the context of embedded sy...
Projet MEVALA queueing system is considered, with a large number $N$ of identical infinite-buffer FC...
We address in this paper the verification of imperative programs with recursion. Our approach consis...
In this paper we study the asymptotic behavior of the tail of the stationary backlog distribution in...
We give a survey on packages for multiple precision interval arithmetic, with the main focus on thre...
Projet MEVALRandom grammars were introduced in computer science, but the study of their thermodynami...
We present an assertional approach to prove properties of Alpha programs. Alpha is a functional lang...
We consider weak eulerian evolution of domains through the convection of a measurable set by a nonsm...
Rising complexity and performances of embedded systems, shortening time-to-ma- rket demands for digi...
Colloque avec actes et comité de lecture.Real-world problems are often characterized by the large si...
This paper presents integer multiplication and division operators dedicated to Virtex-II FPGAs from ...
Wireless technologies and the deployment of mobile and nomadic services are driving the emergence of...
We deal with a numerical method for HJB equations coming from optimal control problems with state co...
In this thesis we study quenching and blowup problems for reaction diffusion equations with Cauchy-D...
In this report, we present an estimation of the one-hop delay in 802.11 wireless network using the O...
In this paper we present GDS, a new approach for code optimization within the context of embedded sy...
Projet MEVALA queueing system is considered, with a large number $N$ of identical infinite-buffer FC...
We address in this paper the verification of imperative programs with recursion. Our approach consis...