Sciweavers

5153 search results - page 8 / 1031
» Introduction to Randomized Algorithms
Sort
View
94
Voted
SODA
2012
ACM
170views Algorithms» more  SODA 2012»
13 years 2 days ago
Compression via matroids: a randomized polynomial kernel for odd cycle transversal
The Odd Cycle Transversal problem (OCT) asks whether a given graph can be made bipartite by deleting at most k of its vertices. In a breakthrough result Reed, Smith, and Vetta (Op...
Stefan Kratsch, Magnus Wahlström
77
Voted
ICIP
2005
IEEE
15 years 11 months ago
Joint feature-spatial-measure space: a new approach to highly efficient probabilistic object tracking
In this paper we present a probabilistic framework for tracking objects based on local dynamic segmentation. We view the segn to be a Markov labeling process and abstract it as a ...
Feng Chen, XiaoTong Yuan, ShuTang Yang
IDEAS
2007
IEEE
144views Database» more  IDEAS 2007»
15 years 4 months ago
An Extensible and Personalized Approach to QoS-enabled Service Discovery
We present an extensible and customizable framework for the autonomous discovery of Semantic Web services based on their QoS properties. Using semantic technologies, users can spe...
Le-Hung Vu, Fabio Porto, Karl Aberer, Manfred Haus...
73
Voted
ICANNGA
2007
Springer
110views Algorithms» more  ICANNGA 2007»
15 years 3 months ago
Genetic Programming for Proactive Aggregation Protocols
Abstract. We present an approach for automated generation of proactive aggregation protocols using Genetic Programming. First a short introduction into aggregation and proactive pr...
Thomas Weise, Kurt Geihs, Philipp A. Baer
96
Voted
ESOP
2009
Springer
15 years 1 months ago
Type-Based Automated Verification of Authenticity in Cryptographic Protocols
Gordon and Jeffrey have proposed a type and effect system for checking authenticity in cryptographic protocols. The type system reduces the protocol verification problem to the typ...
Daisuke Kikuchi, Naoki Kobayashi