Sciweavers

1054 search results - page 121 / 211
» Capacitated Domination Problem
Sort
View
FOCS
2008
IEEE
15 years 5 months ago
Constant-Time Approximation Algorithms via Local Improvements
We present a technique for transforming classical approximation algorithms into constant-time algorithms that approximate the size of the optimal solution. Our technique is applic...
Huy N. Nguyen, Krzysztof Onak
CIS
2007
Springer
15 years 5 months ago
A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-Key Cryptography
The session initiation protocol (SIP) is considered as the dominant signaling protocol for calls over the internet. However, SIP authentication typically uses HTTP digest authentic...
Fengjiao Wang, Yuqing Zhang
GECCO
2007
Springer
138views Optimization» more  GECCO 2007»
15 years 5 months ago
Reducing the space-time complexity of the CMA-ES
A limited memory version of the covariance matrix adaptation evolution strategy (CMA-ES) is presented. This algorithm, L-CMA-ES, improves the space and time complexity of the CMA-...
James N. Knight, Monte Lunacek
ICA
2007
Springer
15 years 5 months ago
Extraction of Atrial Activity from the ECG by Spectrally Constrained ICA Based on Kurtosis Sign
Abstract. This paper deals with the problem of estimating atrial activity during atrial fibrillation periods in the electrocardiogram (ECG). Since the signal of interest differs ...
Ronald Phlypo, Vicente Zarzoso, Pierre Comon, Yves...
ISAAC
2007
Springer
92views Algorithms» more  ISAAC 2007»
15 years 5 months ago
Using Nash Implementation to Achieve Better Frugality Ratios
Most of the recent works on algorithmic mechanism design exploit the solution concept of dominant strategy equilibria. Such work designs a proper payment scheme so that selfish ag...
Chien-Chung Huang, Ming-Yang Kao, Xiang-Yang Li, W...