Sciweavers

2150 search results - page 339 / 430
» On a restricted cross-intersection problem
Sort
View
ICRA
2010
IEEE
119views Robotics» more  ICRA 2010»
14 years 8 months ago
Evader surveillance under incomplete information
— This paper is concerned with determining whether a mobile robot, called the pursuer, is up to maintaining visibility of an antagonist agent, called the evader. This problem, a ...
Israel Becerra, Rafael Murrieta-Cid, Raul Monroy
JCST
2010
139views more  JCST 2010»
14 years 8 months ago
Dirichlet Process Gaussian Mixture Models: Choice of the Base Distribution
In the Bayesian mixture modeling framework it is possible to infer the necessary number of components to model the data and therefore it is unnecessary to explicitly restrict the n...
Dilan Görür, Carl Edward Rasmussen
JCT
2010
114views more  JCT 2010»
14 years 8 months ago
An almost quadratic bound on vertex Folkman numbers
The vertex Folkman number F(r, n, m), n < m, is the smallest integer t such that there exists a Km-free graph of order t with the property that every r-coloring of its vertices...
Andrzej Dudek, Vojtech Rödl
PVLDB
2010
120views more  PVLDB 2010»
14 years 8 months ago
Sampling the Repairs of Functional Dependency Violations under Hard Constraints
Violations of functional dependencies (FDs) are common in practice, often arising in the context of data integration or Web data extraction. Resolving these violations is known to...
George Beskales, Ihab F. Ilyas, Lukasz Golab
PVLDB
2010
129views more  PVLDB 2010»
14 years 8 months ago
Graph Pattern Matching: From Intractable to Polynomial Time
Graph pattern matching is typically defined in terms of subgraph isomorphism, which makes it an np-complete problem. Moreover, it requires bijective functions, which are often to...
Wenfei Fan, Jianzhong Li, Shuai Ma, Nan Tang, Ying...