Sciweavers

1192 search results - page 118 / 239
» Computing Weakest Readings
Sort
View
MFCS
2007
Springer
15 years 9 months ago
Exact Algorithms for L (2, 1)-Labeling of Graphs
The notion of distance constrained graph labelings, motivated by the Frequency Assignment Problem, reads as follows: A mapping from the vertex set of a graph G = (V, E) into an in...
Jan Kratochvíl, Dieter Kratsch, Mathieu Lie...
123
Voted
SUTC
2006
IEEE
15 years 9 months ago
Detecting the Direction of Motion in a Binary Sensor Network
We examine the problem of detecting the direction of motion in a binary sensor network; in such a network each sensor’s value is supplied reliably in a single bit of information...
Panagiotis Karras, Nikos Mamoulis
117
Voted
CSMR
2005
IEEE
15 years 9 months ago
Correlating Features and Code Using a Compact Two-Sided Trace Analysis Approach
Software developers are constantly required to modify and adapt application features in response to changing requirements. The problem is that just by reading the source code, it ...
Orla Greevy, Stéphane Ducasse
GD
2005
Springer
15 years 9 months ago
Visualizing Graphs as Trees: Plant a Seed and Watch it Grow
TreePlus is a graph browsing technique based on a tree-style layout. It shows the missing graph structure using interaction techniques and enables users to start with a specific no...
Bongshin Lee, Cynthia Sims Parr, Catherine Plaisan...
110
Voted
MIDDLEWARE
2005
Springer
15 years 9 months ago
Dual-Quorum Replication for Edge Services
This paper introduces dual-quorum replication, a novel data replication algorithm designed to support Internet edge services. Dual-quorum replication combines volume leases and qu...
Lei Gao, Michael Dahlin, Jiandan Zheng, Lorenzo Al...