Sciweavers

903 search results - page 43 / 181
» Non-well-founded trees in categories
Sort
View
DAGSTUHL
2004
15 years 1 months ago
The Priority R-Tree: A Practically Efficient and Worst-Case-Optimal R-Tree
We present the Priority R-tree, or PR-tree, which is the first R-tree variant that always answers a window query using O((N/B)1-1/d + T/B) I/Os, where N is the number of ddimensio...
Lars Arge, Mark de Berg, Herman J. Haverkort, Ke Y...
SODA
2004
ACM
93views Algorithms» more  SODA 2004»
15 years 1 months ago
Bipartite roots of graphs
Graph H is a root of graph G if there exists a positive integer k such that x and y are adjacent in G if and only if their distance in H is at most k. Motwani and Sudan [1994] prov...
Lap Chi Lau
GECCO
2008
Springer
128views Optimization» more  GECCO 2008»
15 years 27 days ago
A tree-based GA representation for the portfolio optimization problem
Recently, a number of works have been done on how to use Genetic Algorithms to solve the Portfolio Optimization problem, which is an instance of the Resource Allocation problem cl...
Claus de Castro Aranha, Hitoshi Iba
GECCO
2008
Springer
141views Optimization» more  GECCO 2008»
15 years 27 days ago
Potential fitness for genetic programming
We introduce potential fitness, a variant of fitness function that operates in the space of schemata and is applicable to tree-based genetic programing. The proposed evaluation ...
Krzysztof Krawiec, PrzemysBaw Polewski
SIGCOMM
2010
ACM
15 years 18 hour ago
Passive IP traceback: capturing the origin of anonymous traffic through network telescopes
IP traceback can be used to find the origin of anonymous traffic; however, Internet-scale IP traceback systems have not been deployed due to a need for cooperation between Interne...
Guang Yao, Jun Bi, Zijian Zhou