Sciweavers

601 search results - page 96 / 121
» Edge-dominating cycles in graphs
Sort
View
50
Voted
COMBINATORICS
2007
55views more  COMBINATORICS 2007»
15 years 14 days ago
Which Chessboards have a Closed Knight's Tour within the Cube?
A closed knight’s tour of a chessboard uses legal moves of the knight to visit every square exactly once and return to its starting position. When the chessboard is translated i...
Joe DeMaio
BMCBI
2010
154views more  BMCBI 2010»
14 years 10 months ago
Knowledge-based matrix factorization temporally resolves the cellular responses to IL-6 stimulation
Background: External stimulations of cells by hormones, cytokines or growth factors activate signal transduction pathways that subsequently induce a re-arrangement of cellular gen...
Andreas Kowarsch, Florian Blöchl, Sebastian B...
125
Voted
KDD
2012
ACM
201views Data Mining» more  KDD 2012»
13 years 2 months ago
Low rank modeling of signed networks
Trust networks, where people leave trust and distrust feedback, are becoming increasingly common. These networks may be regarded as signed graphs, where a positive edge weight cap...
Cho-Jui Hsieh, Kai-Yang Chiang, Inderjit S. Dhillo...
110
Voted
ICCAD
1994
IEEE
117views Hardware» more  ICCAD 1994»
15 years 4 months ago
Optimization of critical paths in circuits with level-sensitive latches
A simple extension of the critical path method is presented which allows more accurate optimization of circuits with level-sensitive latches. The extended formulation provides a s...
Timothy M. Burks, Karem A. Sakallah
99
Voted
KDD
2006
ACM
122views Data Mining» more  KDD 2006»
16 years 26 days ago
Measuring and extracting proximity in networks
Measuring distance or some other form of proximity between objects is a standard data mining tool. Connection subgraphs were recently proposed as a way to demonstrate proximity be...
Yehuda Koren, Stephen C. North, Chris Volinsky