Sciweavers

1086 search results - page 115 / 218
» Jug measuring: Algorithms and complexity
Sort
View
WWW
2007
ACM
15 years 10 months ago
Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography
In a social network, nodes correspond to people or other social entities, and edges correspond to social links between them. In an effort to preserve privacy, the practice of anon...
Lars Backstrom, Cynthia Dwork, Jon M. Kleinberg
ICCAD
2001
IEEE
103views Hardware» more  ICCAD 2001»
15 years 6 months ago
Interconnect Resource-Aware Placement for Hierarchical FPGAs
In this paper, we utilize Rent’s rule as an empirical measure for efficient clustering and placement of circuits on hierarchical FPGAs. We show that careful matching of design c...
Amit Singh, Ganapathy Parthasarathy, Malgorzata Ma...
CVPR
2010
IEEE
15 years 5 months ago
Detecting and Parsing Architecture at City Scale from Range Data
We present a method for detecting and parsing buildings from unorganized 3D point clouds into a compact, hierarchical representation that is useful for high-level tasks. The input...
Alexander Toshev, Philippos Mordohai, Ben Taskar
ICC
2007
IEEE
136views Communications» more  ICC 2007»
15 years 4 months ago
Applying The Balanced Capacity Concept to DSL Systems
— This paper investigates a fair resource allocation method in crosstalk limited DSL (Digital Subscriber Line) systems. As a measure of fairness, the concept of Balanced Capacity...
Ali Kalakech, Jérôme Louveaux, Luc Va...
GLOBECOM
2006
IEEE
15 years 3 months ago
Optimal Routing in the Worst-Case-Error Metric
— This paper considers the problem of finding the path with minimum (zero) worst possible number of errors in a network with V nodes where (1) some nodes are capable of correcti...
Edwin Soedarmadji