Sciweavers

370 search results - page 43 / 74
» Independent Sets with Domination Constraints
Sort
View
141
Voted
TNN
2008
128views more  TNN 2008»
15 years 1 months ago
Nonnegative Matrix Factorization in Polynomial Feature Space
Abstract--Plenty of methods have been proposed in order to discover latent variables (features) in data sets. Such approaches include the principal component analysis (PCA), indepe...
Ioan Buciu, Nikos Nikolaidis, Ioannis Pitas
WDAG
2009
Springer
94views Algorithms» more  WDAG 2009»
15 years 6 months ago
Local Computation of Nearly Additive Spanners
Abstract. An (α, β)-spanner of a graph G is a subgraph H that approximates distances in G within a multiplicative factor α and an additive error β, ensuring that for any two no...
Bilel Derbel, Cyril Gavoille, David Peleg, Laurent...
GLOBECOM
2007
IEEE
15 years 8 months ago
Cognitive Medium Access: A Protocol for Enhancing Coexistence in WLAN Bands
— In this paper we propose Cognitive Medium Access (CMA), a protocol aimed at improving coexistence with a set of independently evolving WLAN bands. A time-slotted physical layer...
Stefan Geirhofer, Lang Tong, Brian M. Sadler
98
Voted
COMPGEOM
2006
ACM
15 years 7 months ago
Refolding planar polygons
Abstract This paper describes an algorithm for generating a guaranteed intersectionfree interpolation sequence between any pair of compatible polygons. Our algorithm builds on prio...
Hayley N. Iben, James F. O'Brien, Erik D. Demaine
109
Voted
ICDT
2005
ACM
117views Database» more  ICDT 2005»
15 years 7 months ago
Privacy in Database Publishing
We formulate and study a privacy guarantee to data owners, who share information with clients by publishing views of a proprietary database. The owner identifies the sensitive pro...
Alin Deutsch, Yannis Papakonstantinou