Sciweavers

523 search results - page 38 / 105
» Decidability of string graphs
Sort
View
OSDI
2006
ACM
16 years 3 months ago
Securing Software by Enforcing Data-flow Integrity
Software attacks often subvert the intended data-flow in a vulnerable program. For example, attackers exploit buffer overflows and format string vulnerabilities to write data to u...
Manuel Costa, Miguel Castro, Timothy L. Harris
130
Voted
COCOON
2007
Springer
15 years 9 months ago
Algorithms for Core Stability, Core Largeness, Exactness, and Extendability of Flow Games
In this paper, we give linear time algorithms to decide core stability, core largeness, exactness, and extendability of flow games on uniform networks (all edge capacities are 1)....
Qizhi Fang, Rudolf Fleischer, Jian Li, Xiaoxun Sun
SWAT
2010
Springer
260views Algorithms» more  SWAT 2010»
15 years 8 months ago
Isomorphism for Graphs of Bounded Feedback Vertex Set Number
This paper presents an O(n2 ) algorithm for deciding isomorphism of graphs that have bounded feedback vertex set number. This number is defined as the minimum number of vertex de...
Stefan Kratsch, Pascal Schweitzer
ISAAC
2003
Springer
75views Algorithms» more  ISAAC 2003»
15 years 8 months ago
On the Existence and Determination of Satisfactory Partitions in a Graph
The Satisfactory Partition problem consists in deciding if a given graph has a partition of its vertex set into two nonempty sets V1, V2 such that for each vertex v, if v ∈ Vi th...
Cristina Bazgan, Zsolt Tuza, Daniel Vanderpooten
114
Voted
AAECC
2005
Springer
114views Algorithms» more  AAECC 2005»
15 years 3 months ago
The adjacency graph of a real algebraic surface
Abstract. The paper deals with the question of recognizing the mutual positions of the connected components of a non-singular real projective surface S in the real projective 3-spa...
Elisabetta Fortuna, Patrizia M. Gianni, Domenico L...