Sciweavers

725 search results - page 130 / 145
» Bounding Degrees on RPL
Sort
View
TPDS
1998
110views more  TPDS 1998»
14 years 11 months ago
On Exploiting Task Duplication in Parallel Program Scheduling
—One of the main obstacles in obtaining high performance from message-passing multicomputer systems is the inevitable communication overhead which is incurred when tasks executin...
Ishfaq Ahmad, Yu-Kwong Kwok
SODA
2010
ACM
142views Algorithms» more  SODA 2010»
14 years 10 months ago
Speeding up random walks with neighborhood exploration
We consider the following marking process (rw-rand) made by a random walk on an undirected graph G. Upon arrival at a vertex v, it marks v if unmarked and otherwise it marks a ran...
Petra Berenbrink, Colin Cooper, Robert Elsaesser, ...
ISVD
2010
IEEE
14 years 9 months ago
Guaranteed Quality Tetrahedral Delaunay Meshing for Medical Images
—In this paper, we present a Delaunay refinement algorithm for meshing 3D medical images. We prove that (a) all the tetrahedra of the output mesh have radius-edge ratio less tha...
Panagiotis A. Foteinos, Andrey N. Chernikov, Nikos...
RSA
2010
91views more  RSA 2010»
14 years 9 months ago
The second largest component in the supercritical 2D Hamming graph
The 2-dimensional Hamming graph H(2, n) consists of the n2 vertices (i, j), 1 ≤ i, j ≤ n, two vertices being adjacent when they share a common coordinate. We examine random sub...
Remco van der Hofstad, Malwina J. Luczak, Joel Spe...
VTC
2010
IEEE
175views Communications» more  VTC 2010»
14 years 9 months ago
Incremental Relaying with Imperfect Feedback in Wireless Cooperative Networks
—We present the ǫ-outage capacity in the low signal-to-noise ratio (SNR) regime of an incremental relaying network. The network consists of one source, one destination, and two ...
Tobias Renk, Holger Jaekel, Friedrich Jondral