Sciweavers

32 search results - page 4 / 7
» The set constraint CFL reachability connection in practice
Sort
View
WEA
2010
Springer
330views Algorithms» more  WEA 2010»
14 years 17 days ago
Exact Bipartite Crossing Minimization under Tree Constraints
A tanglegram consists of a pair of (not necessarily binary) trees T1, T2 with leaf sets L1, L2. Additional edges, called tangles, may connect nodes in L1 with those in L2. The task...
Frank Baumann, Christoph Buchheim, Frauke Liers
MOBIHOC
2005
ACM
14 years 5 months ago
Sextant: a unified node and event localization framework using non-convex constraints
Determining node and event locations is a canonical task for many wireless network applications. Yet dedicated infrastructure for determining position information is expensive, en...
Emin Gün Sirer, Rohan Murty, Saikat Guha
TON
1998
90views more  TON 1998»
13 years 5 months ago
Effective bandwidths with priorities
—The notion of effective bandwidths has provided a useful practical framework for connection admission control and capacity planning in high-speed communication networks. The ass...
Arthur W. Berger, Ward Whitt
CPAIOR
2011
Springer
12 years 9 months ago
Upgrading Shortest Paths in Networks
We introduce the Upgrading Shortest Paths Problem, a new combinatorial problem for improving network connectivity with a wide range of applications from multicast communication to ...
Bistra N. Dilkina, Katherine J. Lai, Carla P. Gome...
ICCV
2009
IEEE
3167views Computer Vision» more  ICCV 2009»
14 years 10 months ago
Tracking a Hand Manipulating an Object
We present a method for tracking a hand while it is interacting with an object. This setting is arguably the one where hand-tracking has most practical relevance, but poses signi...
Henning Hamer, Konrad Schindler, Esther Koller-Mei...