Sciweavers

5153 search results - page 8 / 1031
» Introduction to Randomized Algorithms
Sort
View
SODA
2012
ACM
170views Algorithms» more  SODA 2012»
13 years 6 months ago
Compression via matroids: a randomized polynomial kernel for odd cycle transversal
The Odd Cycle Transversal problem (OCT) asks whether a given graph can be made bipartite by deleting at most k of its vertices. In a breakthrough result Reed, Smith, and Vetta (Op...
Stefan Kratsch, Magnus Wahlström
ICIP
2005
IEEE
16 years 5 months ago
Joint feature-spatial-measure space: a new approach to highly efficient probabilistic object tracking
In this paper we present a probabilistic framework for tracking objects based on local dynamic segmentation. We view the segn to be a Markov labeling process and abstract it as a ...
Feng Chen, XiaoTong Yuan, ShuTang Yang
IDEAS
2007
IEEE
144views Database» more  IDEAS 2007»
15 years 10 months ago
An Extensible and Personalized Approach to QoS-enabled Service Discovery
We present an extensible and customizable framework for the autonomous discovery of Semantic Web services based on their QoS properties. Using semantic technologies, users can spe...
Le-Hung Vu, Fabio Porto, Karl Aberer, Manfred Haus...
ICANNGA
2007
Springer
110views Algorithms» more  ICANNGA 2007»
15 years 10 months ago
Genetic Programming for Proactive Aggregation Protocols
Abstract. We present an approach for automated generation of proactive aggregation protocols using Genetic Programming. First a short introduction into aggregation and proactive pr...
Thomas Weise, Kurt Geihs, Philipp A. Baer
ESOP
2009
Springer
15 years 7 months ago
Type-Based Automated Verification of Authenticity in Cryptographic Protocols
Gordon and Jeffrey have proposed a type and effect system for checking authenticity in cryptographic protocols. The type system reduces the protocol verification problem to the typ...
Daisuke Kikuchi, Naoki Kobayashi