Sciweavers

564 search results - page 72 / 113
» Approximation algorithms for restricted Bayesian network str...
Sort
View
139
Voted
ICALP
2005
Springer
15 years 10 months ago
New Approaches for Virtual Private Network Design
Virtual Private Network Design is the following NP-hard problem. We are given a communication network, represented as a weighted graph with thresholds on the nodes which represent...
Friedrich Eisenbrand, Fabrizio Grandoni, Gianpaolo...
ATAL
2005
Springer
15 years 10 months ago
A probabilistic approach to resource allocation in distributed fusion systems
In complex multi-agent fusion systems resource conflicts are very likely to occur. We propose an algorithm that determines the optimal sensing resource to fusion task assignment,...
Jan Nunnink, Gregor Pavlin
INFOCOM
2003
IEEE
15 years 10 months ago
Algorithms for Computing QoS Paths with Restoration
— There is a growing interest among service providers to offer new services with Quality of Service (QoS) guaranties that are also resilient to failures. Supporting QoS connectio...
Yigal Bejerano, Yuri Breitbart, Rajeev Rastogi, Al...
169
Voted
KDD
2004
ACM
137views Data Mining» more  KDD 2004»
15 years 10 months ago
Mining scale-free networks using geodesic clustering
Many real-world graphs have been shown to be scale-free— vertex degrees follow power law distributions, vertices tend to cluster, and the average length of all shortest paths is...
Andrew Y. Wu, Michael Garland, Jiawei Han
180
Voted
STRINGOLOGY
2004
15 years 6 months ago
BDD-Based Analysis of Gapped q-Gram Filters
Recently, there has been a surge of interest in gapped q-gram filters for approximate string matching. Important design parameters for filters are for example the value of q, the f...
Marc Fontaine, Stefan Burkhardt, Juha Kärkk&a...