Sciweavers

522 search results - page 91 / 105
» A Graph Theoretical Approach to Network Encoding Complexity
Sort
View
93
Voted
GECCO
2008
Springer
156views Optimization» more  GECCO 2008»
15 years 24 days ago
Computing minimum cuts by randomized search heuristics
We study the minimum s-t-cut problem in graphs with costs on the edges in the context of evolutionary algorithms. Minimum cut problems belong to the class of basic network optimiz...
Frank Neumann, Joachim Reichel, Martin Skutella
TON
2010
126views more  TON 2010»
14 years 6 months ago
MAC Scheduling With Low Overheads by Learning Neighborhood Contention Patterns
Aggregate traffic loads and topology in multi-hop wireless networks may vary slowly, permitting MAC protocols to `learn' how to spatially coordinate and adapt contention patte...
Yung Yi, Gustavo de Veciana, Sanjay Shakkottai
INFOCOM
2003
IEEE
15 years 5 months ago
Prophet Address Allocation for Large Scale MANETs
—A mobile device in a MANET must be assigned a free IP address before it may participate in unicast communication. This is a fundamental and difficult problem in the practical us...
Hongbo Zhou, Lionel M. Ni, Matt W. Mutka
NIPS
1994
15 years 1 months ago
Efficient Methods for Dealing with Missing Data in Supervised Learning
We present efficient algorithms for dealing with the problem of missing inputs (incomplete feature vectors) during training and recall. Our approach is based on the approximation ...
Volker Tresp, Ralph Neuneier, Subutai Ahmad
CRYPTO
2006
Springer
159views Cryptology» more  CRYPTO 2006»
15 years 3 months ago
Asymptotically Optimal Two-Round Perfectly Secure Message Transmission
Abstract. The problem of perfectly secure message transmission concerns two synchronized non-faulty processors sender (S) and receiver (R) that are connected by a synchronous netwo...
Saurabh Agarwal, Ronald Cramer, Robbert de Haan