Sciweavers

1639 search results - page 261 / 328
» Degree-constrained network flows
Sort
View
SODA
2001
ACM
93views Algorithms» more  SODA 2001»
15 years 2 months ago
Improved algorithms for 3-coloring, 3-edge-coloring, and constraint satisfaction
We consider worst case time bounds for NP-complete problems including 3-SAT, 3-coloring, 3-edge-coloring, and 3list-coloring. Our algorithms are based on a constraint satisfaction...
David Eppstein
108
Voted
BNT
1997
15 years 2 months ago
Tag-switching architecture: overview
Tag switching is a way to combine the label-swapping forwarding paradigm with network layer routing. This has several advantages. Tags can have a wide spectrum of forwarding granu...
Yakov Rekhter
116
Voted
OSDI
2000
ACM
15 years 2 months ago
End-to-End Authorization
Many boundaries impede the flow of authorization information, forcing applications that span those boundaries into hop-by-hop approaches to authorization. We present a unified app...
Jon Howell, David Kotz
AAAI
1996
15 years 1 months ago
Intelligent Retail Logistics Scheduling
The Supply Chain Integrated Ordering Network (SCION) Depot Bookings system automates the planning and scheduling of perishable and non-perishable commodities and the vehicles that...
John Rowe, Keith Jewers, Andrew Codd, Andrew Alcoc...
100
Voted
DIMVA
2009
15 years 1 months ago
Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications
We demonstrate that the browser implementation used at a host can be passively identified with significant precision and recall, using only coarse summaries of web traffic to and f...
Ting-Fang Yen, Xin Huang, Fabian Monrose, Michael ...