scispace - formally typeset
Search or ask a question
Topic

Bounding overwatch

About: Bounding overwatch is a research topic. Over the lifetime, 966 publications have been published within this topic receiving 15156 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: In this article, it was shown that variance bounding is equivalent to the existence of usual central limit theorems for all $L 2$ functionals for all reversible Markov chains.
Abstract: We introduce a new property of Markov chains, called variance bounding. We prove that, for reversible chains at least, variance bounding is weaker than, but closely related to, geometric ergodicity. Furthermore, variance bounding is equivalent to the existence of usual central limit theorems for all $L^2$ functionals. Also, variance bounding (unlike geometric ergodicity) is preserved under the Peskun order. We close with some applications to Metropolis--Hastings algorithms.

44 citations

Journal ArticleDOI
TL;DR: In this article, the problem of finding a hyper-pyramid to bound the set of states that are reachable from the origin in the Euclidean space is addressed, subject to inputs whose ( 1, 1 ) -norm or ( ∞, 1 ) −norm is bounded by a prescribed constant.

44 citations

Journal ArticleDOI
TL;DR: A new approach is proposed to obtain the smallest box which bounds all reachable sets of a class of nonlinear time-delay systems with bounded disturbances.

44 citations

01 Jan 1984
TL;DR: In this paper, game-theoretic concepts are used to bound the solution of the continuous version of the optimal equilibrium network design problem by using two computationally efficient heuristics, which can then be used to assess whether or not it is necessary to solve for the exact solution.
Abstract: The solution of the optimal equilibrium network design problem is perhaps the most computationally intensive problem encountered in transportation network analysis. This paper illustrates through the use of game-theoretic concepts how one can bound the solution of the continuous version of this problem by using two computationally efficient heuristics. This bounding procedure can then be used to assess whether or not it is necessary to solve for the exact solution to this problem. A numerical example is presented which illustrates this procedure. (Author/TRRL)

44 citations

Book ChapterDOI
12 Dec 2007
TL;DR: This paper shows how to get message boundedness "for free" under a reasonable (syntactic) assumption on protocols, which is called well-formedness, which enables us to improve existing decidability results.
Abstract: The verification of security protocols has been proven to be undecidable in general. Different approaches use simplifying hypotheses in order to obtain decidability for interesting subclasses. Amongst the most common is type abstraction, i.e. considering only well-typed runs, therefore bounding message length. In this paper, we show how to get message boundedness "for free" under a reasonable (syntactic) assumption on protocols, which we call well-formedness. This enables us to improve existing decidability results.

44 citations


Network Information
Related Topics (5)
Robustness (computer science)
94.7K papers, 1.6M citations
85% related
Optimization problem
96.4K papers, 2.1M citations
85% related
Matrix (mathematics)
105.5K papers, 1.9M citations
82% related
Nonlinear system
208.1K papers, 4M citations
81% related
Artificial neural network
207K papers, 4.5M citations
80% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023714
20221,629
2021155
202075
201973
201850