Sciweavers

473 search results - page 73 / 95
» Computing excluded minors
Sort
View
108
Voted
EJC
2008
15 years 19 days ago
Grad and classes with bounded expansion II. Algorithmic aspects
Abstract. Classes of graphs with bounded expansion are a generalization of both proper minor closed classes and degree bounded classes. Such classes are based on a new invariant, t...
Jaroslav Nesetril, Patrice Ossona de Mendez
115
Voted
IIE
2007
159views more  IIE 2007»
15 years 15 days ago
Creating and Visualizing Test Data from Programming Exercises
Automatic assessment of programming exercises is typically based on testing approach. Most automatic assessment frameworks execute tests and evaluate test results automatically, bu...
Petri Ihantola
JHSN
2000
172views more  JHSN 2000»
15 years 10 days ago
Dynamic token bucket (DTB): a fair bandwidth allocation algorithm for high-speed networks
Fair allocation of available bandwidth to competing flows is a simple form of quality of service (QoS) that can be provided to customers in packet-switched networks. A number of p...
Jayakrishna Kidambi, Dipak Ghosal, Biswanath Mukhe...
IANDC
2010
116views more  IANDC 2010»
14 years 11 months ago
Weak bisimulation is sound and complete for pCTL*
Abstract. We investigate weak bisimulation of probabilistic systems in the presence of nondeterminism, i.e. labelled concurrent Markov chains (LCMC) with silent transitions. We bui...
Josée Desharnais, Vineet Gupta, Radha Jagad...
84
Voted
ICIP
2010
IEEE
14 years 10 months ago
Dual Range Deringing for non-blind image deconvolution
The popular Richardson-Lucy (RL) image deconvolution algorithm often produces undesirable ringing artifacts. In this paper, we propose a novel Dual Range Deringing (DRD) algorithm...
Le Zou, Howard Zhou, Samuel Cheng, Chuan He