Sciweavers

494 search results - page 52 / 99
» Heap Building Bounds
Sort
View
97
Voted
INFOCOM
2003
IEEE
15 years 4 months ago
Design and Analysis of an MST-Based Topology Control Algorithm
— In this paper, we present a Minimum Spanning Tree (MST) based topology control algorithm, called Local Minimum Spanning Tree (LMST), for wireless multi-hop networks. In this al...
Ning Li, Jennifer C. Hou, Lui Sha
NCA
2003
IEEE
15 years 4 months ago
Performance analysis for a DiffServ-enabled network: The case of Relative Service
A lot of research work has recently focused on the exploitation of the DiffServ framework towards building reliable networking services that provide deterministic quality guarante...
Christos Bouras, Afrodite Sevasti
COMPGEOM
2003
ACM
15 years 4 months ago
Restricted delaunay triangulations and normal cycle
We address the problem of curvature estimation from sampled smooth surfaces. Building upon the theory of normal cycles, we derive a definition of the curvature tensor for polyhed...
David Cohen-Steiner, Jean-Marie Morvan
ISAAC
2001
Springer
104views Algorithms» more  ISAAC 2001»
15 years 3 months ago
Algorithms for Pattern Involvement in Permutations
We consider the problem of developing algorithms for the recognition of a fixed pattern within a permutation. These methods are based upon using a carefully chosen chain or tree ...
Michael H. Albert, Robert E. L. Aldred, Mike D. At...
82
Voted
IWANN
2001
Springer
15 years 3 months ago
The General Neural-Network Paradigm for Visual Cryptography
This paper proposes the general paradigm to build Q'tron neural networks (NNs) for visual cryptography. Given a visual encryption scheme, usually described using an access st...
Tai-Wen Yue, Suchen Chiang