Sciweavers

ISAAC
2005
Springer
107views Algorithms» more  ISAAC 2005»
13 years 9 months ago
Minimizing a Monotone Concave Function with Laminar Covering Constraints
Mariko Sakashita, Kazuhisa Makino, Satoru Fujishig...
ISAAC
2005
Springer
113views Algorithms» more  ISAAC 2005»
13 years 9 months ago
A Simple Optimal Randomized Algorithm for Sorting on the PDM
Abstract. The Parallel Disks Model (PDM) has been proposed to alleviate the I/O bottleneck that arises in the processing of massive data sets. Sorting has been extensively studied ...
Sanguthevar Rajasekaran, Sandeep Sen
ISAAC
2005
Springer
93views Algorithms» more  ISAAC 2005»
13 years 9 months ago
Representation of Graphs by OBDDs
Abstract. In this paper, the space requirements for the OBDD representation of certain graph classes, specifically cographs, several types of graphs with few P4s, unit interval gr...
Robin Nunkesser, Philipp Woelfel
ISAAC
2005
Springer
113views Algorithms» more  ISAAC 2005»
13 years 9 months ago
Fast Algorithms for Computing the Tripartition-Based Distance Between Phylogenetic Networks
Consider two phylogenetic networks N and N′ of size n. The tripartition-based distance finds the proportion of tripartitions which are not shared by N and N′ . This distance i...
Nguyen Bao Nguyen, C. Thach Nguyen, Wing-Kin Sung
ISAAC
2005
Springer
100views Algorithms» more  ISAAC 2005»
13 years 9 months ago
Hardness and Approximation of Octilinear Steiner Trees
Matthias Müller-Hannemann, Anna Schulze
ISAAC
2005
Springer
127views Algorithms» more  ISAAC 2005»
13 years 9 months ago
On Complexity and Approximability of the Labeled Maximum/Perfect Matching Problems
In this paper, we deal with both the complexity and the approximability of the labeled perfect matching problem in bipartite graphs. Given a simple graph G = (V, E) with n vertices...
Jérôme Monnot
ISAAC
2005
Springer
153views Algorithms» more  ISAAC 2005»
13 years 9 months ago
Network Game with Attacker and Protector Entities
Consider an information network with harmful procedures called attackers (e.g., viruses); each attacker uses a probability distribution to choose a node of the network to damage. O...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
ISAAC
2005
Springer
111views Algorithms» more  ISAAC 2005»
13 years 9 months ago
Smoothed Analysis of Binary Search Trees
Binary search trees are one of the most fundamental data structures. While the height of such a tree may be linear in the worst case, the average height with respect to the uniform...
Bodo Manthey, Rüdiger Reischuk
ISAAC
2005
Springer
81views Algorithms» more  ISAAC 2005»
13 years 9 months ago
Complexity and Approximation of the Minimum Recombination Haplotype Configuration Problem
We study the complexity and approximation of the problem of reconstructing haplotypes from genotypes on pedigrees under the Mendelian Law of Inheritance and the minimum recombinant...
Lan Liu, Xi Chen, Jing Xiao, Tao Jiang
ISAAC
2005
Springer
90views Algorithms» more  ISAAC 2005»
13 years 9 months ago
Approximate Colored Range Queries
In this paper, we formulate a class of colored range query problems to model the multi-dimensional range queries in the presence of categorical information. By applying appropriate...
Ying Kit Lai, Chung Keung Poon, Benyun Shi