Sciweavers

1291 search results - page 163 / 259
» Computing the multiplicity structure in solving polynomial s...
Sort
View
STOC
1990
ACM
135views Algorithms» more  STOC 1990»
15 years 5 months ago
A Separator Theorem for Graphs with an Excluded Minor and its Applications
ions (Extended Abstract) Noga Alon Paul Seymour Robin Thomas Let G be an n-vertex graph with nonnegative weights whose sum is 1 assigned to its vertices, and with no minor isomorp...
Noga Alon, Paul D. Seymour, Robin Thomas
CORR
2008
Springer
145views Education» more  CORR 2008»
15 years 1 months ago
Decentralized Overlay for Federation of Enterprise Clouds
This chapter describes Aneka-Federation, a decentralized and distributed system that combines enterprise Clouds, overlay networking, and structured peer-to-peer techniques to crea...
Rajiv Ranjan, Rajkumar Buyya
CCS
2006
ACM
15 years 5 months ago
Resiliency policies in access control
We introduce the notion of resiliency policies in the context of access control systems. Such policies require an access control system to be resilient to the absence of users. An...
Ninghui Li, Mahesh V. Tripunitara, Qihua Wang
ICC
2008
IEEE
113views Communications» more  ICC 2008»
15 years 8 months ago
Multiuser MIMO Downlink Beamforming Based on Group Maximum SINR Filtering
Abstract—In this paper we aim to solve the multiuser multiinput multi-output (MIMO) downlink beamforming problem. The transmitter is a multi-antenna base-station broadcasting to ...
Yu-Han Yang, Shih-Chun Lin, Hsuan-Jung Su
ICCV
2009
IEEE
16 years 6 months ago
Tensor completion for estimating missing values in visual data
In this paper we propose an algorithm to estimate missing values in tensors of visual data. The values can be missing due to problems in the acquisition process, or because the ...
Ji Liu, Przemyslaw Musialski, Peter Wonka, Jieping...