Sciweavers

398 search results - page 28 / 80
» Critical exponents of graphs
Sort
View
CORR
2011
Springer
169views Education» more  CORR 2011»
14 years 4 months ago
Percolation in the Secrecy Graph
— Secrecy graphs model the connectivity of wireless networks under secrecy constraints. Directed edges in the graph are present whenever a node can talk to another node securely ...
Amites Sarkar, Martin Haenggi
90
Voted
COMBINATORICA
2008
123views more  COMBINATORICA 2008»
14 years 11 months ago
Counting canonical partitions in the random graph
Algorithms are given for computing the number of n-element diagonal sets and the number of n-element strongly diagonal sets of binary sequences of length at most 2n - 2. The first...
Jean A. Larson
106
Voted
ECEASST
2010
14 years 10 months ago
Checking Graph-Transformation Systems for Confluence
d Abstract) Detlef Plump Abstract. In general, it is undecidable whether a terminating graphtransformation system is confluent or not. We introduce the class of coverable hypergrap...
Detlef Plump
107
Voted
ICIAP
2003
ACM
16 years 28 days ago
A topological approach for segmenting human body shape
Segmentation of 3D human body is a very challenging problem in applications exploiting human scan data. To tackle this problem, this paper proposes a topological approach based on...
Yijun Xiao, Naoufel Werghi, Paul Siebert
ECAL
2003
Springer
15 years 6 months ago
Visualizing Evolutionary Dynamics of Self-Replicators Using Graph-Based Genealogy
We present a general method for evaluating and visualizing evolutionary dynamics of self-replicators using a graph-based representation for genealogy. Through a transformation from...
Chris Salzberg, Antony Antony, Hiroki Sayama