Sciweavers

494 search results - page 22 / 99
» Heap Building Bounds
Sort
View
CORR
2008
Springer
129views Education» more  CORR 2008»
14 years 10 months ago
Bounds on Codes Based on Graph Theory
"THIS PAPER IS ELIGIBLE FOR THE STUDENT PAPER AWARD" Let Aq(n, d) be the maximum order (maximum number of codewords) of a q-ary code of length n and Hamming distance at l...
Salim Y. El Rouayheb, Costas N. Georghiades, Emina...
84
Voted
WOWMOM
2006
ACM
122views Multimedia» more  WOWMOM 2006»
15 years 4 months ago
Multiple-Access Insights from Bounds on Sensor Localization
In this paper, we build on known bounds on localization in sensor networks and provide new insights that can be used in multiple-access design from a localization perspective. Spe...
Swaroop Venkatesh, R. Michael Buehrer
SODA
2003
ACM
131views Algorithms» more  SODA 2003»
15 years 13 hour ago
Zonotopes as bounding volumes
Zonotopes are centrally symmetric polytopes with a very special structure: they are the Minkowski sum of line segments. In this paper we propose to use zonotopes as bounding volum...
Leonidas J. Guibas, An Nguyen, Li Zhang
UAI
2004
15 years 22 hour ago
Evidence-invariant Sensitivity Bounds
The sensitivities revealed by a sensitivity analysis of a probabilistic network typically depend on the entered evidence. For a real-life network therefore, the analysis is perfor...
Silja Renooij, Linda C. van der Gaag
96
Voted
ADC
2008
Springer
112views Database» more  ADC 2008»
15 years 5 months ago
Semantics based Buffer Reduction for Queries over XML Data Streams
With respect to current methods for query evaluation over XML data streams, adoption of certain types of buffering techniques is unavoidable. Under lots of circumstances, the buff...
Chi Yang, Chengfei Liu, Jianxin Li, Jeffrey Xu Yu,...