Sciweavers

29 search results - page 4 / 6
» Edge maps: Representing flow with bounded error
Sort
View
161
Voted
ACSC
2010
IEEE
14 years 8 months ago
Efficient contour line labelling for terrain modelling
Terrains are an essential part of outdoor environments. Terrain models are important for computer games and applications in architecture, urban design and archaeology. A popular a...
Xin Xie, Burkhard Wünsche
141
Voted
PG
2007
IEEE
15 years 7 months ago
Papercraft Models using Generalized Cylinders
We introduce an algorithm for approximating a 2manifold 3D mesh by a set of developable surfaces. Each developable surface is a generalized cylinder represented as a strip of tria...
Fady Massarwi, Craig Gotsman, Gershon Elber
117
Voted
IPPS
2010
IEEE
14 years 11 months ago
Executing task graphs using work-stealing
Abstract--NABBIT is a work-stealing library for execution of task graphs with arbitrary dependencies which is implemented as a library for the multithreaded programming language Ci...
Kunal Agrawal, Charles E. Leiserson, Jim Sukha
157
Voted
ICALP
2001
Springer
15 years 5 months ago
Approximating the Minimum Spanning Tree Weight in Sublinear Time
We present a probabilistic algorithm that, given a connected graph G (represented by adjacency lists) of average degree d, with edge weights in the set {1, . . . , w}, and given a ...
Bernard Chazelle, Ronitt Rubinfeld, Luca Trevisan
191
Voted
PODS
2009
ACM
134views Database» more  PODS 2009»
16 years 1 months ago
Relationship privacy: output perturbation for queries with joins
We study privacy-preserving query answering over data containing relationships. A social network is a prime example of such data, where the nodes represent individuals and edges r...
Vibhor Rastogi, Michael Hay, Gerome Miklau, Dan Su...