Sciweavers

4962 search results - page 959 / 993
» Connectivity in Sub-Poisson Networks
Sort
View
EUROS
2008
177views Robotics» more  EUROS 2008»
15 years 3 months ago
Eyes-Neck Coordination Using Chaos
Abstract. The increasing complexity of humanoid robots and their expected performance in real dynamic environments demand an equally complex, autonomous and dynamic solution. Our a...
Boris Duran, Yasuo Kuniyoshi, Giulio Sandini
CRITIS
2007
15 years 3 months ago
Ideal Based Cyber Security Technical Metrics for Control Systems
Much of the world's critical infrastructure is at risk from attack through electronic networks connected to control systems. Security metrics are important because they provid...
Wayne F. Boyer, Miles A. McQueen
CSREASAM
2007
15 years 3 months ago
Security Based Heuristic SAX for XML Parsing
- XML based services integrate information resources running on different platforms or technologies to enhance the service efficiency. Thus, the volume of XML traffic on networks i...
Wei Wang
SDM
2010
SIAM
115views Data Mining» more  SDM 2010»
15 years 3 months ago
Radius Plots for Mining Tera-byte Scale Graphs: Algorithms, Patterns, and Observations
Given large, multi-million node graphs (e.g., FaceBook, web-crawls, etc.), how do they evolve over time? How are they connected? What are the central nodes and the outliers of the...
U. Kang, Charalampos E. Tsourakakis, Ana Paula App...
SODA
2008
ACM
128views Algorithms» more  SODA 2008»
15 years 3 months ago
Analysis of greedy approximations with nonsubmodular potential functions
In this paper, we present two techniques to analyze greedy approximation with nonsubmodular functions restricted submodularity and shifted submodularity. As an application of the ...
Ding-Zhu Du, Ronald L. Graham, Panos M. Pardalos, ...