Sciweavers

963 search results - page 151 / 193
» Escape Analysis on Lists
Sort
View
108
Voted
STOC
2003
ACM
171views Algorithms» more  STOC 2003»
16 years 23 days ago
Primal-dual meets local search: approximating MST's with nonuniform degree bounds
We present a new bicriteria approximation algorithm for the degree-bounded minimum-cost spanning tree problem: Given an undirected graph with nonnegative edge weights and degree b...
Jochen Könemann, R. Ravi
161
Voted
SIGMOD
2008
ACM
107views Database» more  SIGMOD 2008»
16 years 18 days ago
Outlier-robust clustering using independent components
How can we efficiently find a clustering, i.e. a concise description of the cluster structure, of a given data set which contains an unknown number of clusters of different shape ...
Christian Böhm, Christos Faloutsos, Claudia P...
SIGMOD
2007
ACM
169views Database» more  SIGMOD 2007»
16 years 18 days ago
Genome-scale disk-based suffix tree indexing
With the exponential growth of biological sequence databases, it has become critical to develop effective techniques for storing, querying, and analyzing these massive data. Suffi...
Benjarath Phoophakdee, Mohammed J. Zaki
126
Voted
PODS
2005
ACM
151views Database» more  PODS 2005»
16 years 17 days ago
Estimating arbitrary subset sums with few probes
Suppose we have a large table T of items i, each with a weight wi, e.g., people and their salary. In a general preprocessing step for estimating arbitrary subset sums, we assign e...
Noga Alon, Nick G. Duffield, Carsten Lund, Mikkel ...
81
Voted
ICSE
2005
IEEE-ACM
16 years 16 days ago
Real-time specification patterns
Embedded systems are pervasive and frequently used for critical systems with time-dependent functionality. Dwyer et al. have developed qualitative specification patterns to facili...
Sascha Konrad, Betty H. C. Cheng