Sciweavers

473 search results - page 73 / 95
» Computing excluded minors
Sort
View
EJC
2008
14 years 10 months ago
Grad and classes with bounded expansion II. Algorithmic aspects
Abstract. Classes of graphs with bounded expansion are a generalization of both proper minor closed classes and degree bounded classes. Such classes are based on a new invariant, t...
Jaroslav Nesetril, Patrice Ossona de Mendez
IIE
2007
159views more  IIE 2007»
14 years 10 months ago
Creating and Visualizing Test Data from Programming Exercises
Automatic assessment of programming exercises is typically based on testing approach. Most automatic assessment frameworks execute tests and evaluate test results automatically, bu...
Petri Ihantola
JHSN
2000
172views more  JHSN 2000»
14 years 10 months ago
Dynamic token bucket (DTB): a fair bandwidth allocation algorithm for high-speed networks
Fair allocation of available bandwidth to competing flows is a simple form of quality of service (QoS) that can be provided to customers in packet-switched networks. A number of p...
Jayakrishna Kidambi, Dipak Ghosal, Biswanath Mukhe...
80
Voted
IANDC
2010
116views more  IANDC 2010»
14 years 8 months ago
Weak bisimulation is sound and complete for pCTL*
Abstract. We investigate weak bisimulation of probabilistic systems in the presence of nondeterminism, i.e. labelled concurrent Markov chains (LCMC) with silent transitions. We bui...
Josée Desharnais, Vineet Gupta, Radha Jagad...
ICIP
2010
IEEE
14 years 8 months ago
Dual Range Deringing for non-blind image deconvolution
The popular Richardson-Lucy (RL) image deconvolution algorithm often produces undesirable ringing artifacts. In this paper, we propose a novel Dual Range Deringing (DRD) algorithm...
Le Zou, Howard Zhou, Samuel Cheng, Chuan He