Sciweavers

564 search results - page 72 / 113
» Approximation algorithms for restricted Bayesian network str...
Sort
View
103
Voted
ICALP
2005
Springer
15 years 6 months ago
New Approaches for Virtual Private Network Design
Virtual Private Network Design is the following NP-hard problem. We are given a communication network, represented as a weighted graph with thresholds on the nodes which represent...
Friedrich Eisenbrand, Fabrizio Grandoni, Gianpaolo...
78
Voted
ATAL
2005
Springer
15 years 6 months ago
A probabilistic approach to resource allocation in distributed fusion systems
In complex multi-agent fusion systems resource conflicts are very likely to occur. We propose an algorithm that determines the optimal sensing resource to fusion task assignment,...
Jan Nunnink, Gregor Pavlin
103
Voted
INFOCOM
2003
IEEE
15 years 5 months ago
Algorithms for Computing QoS Paths with Restoration
— There is a growing interest among service providers to offer new services with Quality of Service (QoS) guaranties that are also resilient to failures. Supporting QoS connectio...
Yigal Bejerano, Yuri Breitbart, Rajeev Rastogi, Al...
KDD
2004
ACM
137views Data Mining» more  KDD 2004»
15 years 6 months ago
Mining scale-free networks using geodesic clustering
Many real-world graphs have been shown to be scale-free— vertex degrees follow power law distributions, vertices tend to cluster, and the average length of all shortest paths is...
Andrew Y. Wu, Michael Garland, Jiawei Han
142
Voted
STRINGOLOGY
2004
15 years 1 months ago
BDD-Based Analysis of Gapped q-Gram Filters
Recently, there has been a surge of interest in gapped q-gram filters for approximate string matching. Important design parameters for filters are for example the value of q, the f...
Marc Fontaine, Stefan Burkhardt, Juha Kärkk&a...