Sciweavers

7840 search results - page 136 / 1568
» On generalized Ramsey numbers
Sort
View
93
Voted
NSPW
2003
ACM
15 years 6 months ago
Owner-controlled information
Large-scale data breaches exposing sensitive personal information are becoming commonplace. For numerous reasons, conventional personal (identification) information leaks from da...
Carrie Gates, Jacob Slonim
103
Voted
CORR
2008
Springer
72views Education» more  CORR 2008»
15 years 23 days ago
Longest paths in Planar DAGs in Unambiguous Logspace
Reachability and distance computation are known to be NL-complete in general graphs, but within UL co-UL if the graphs are planar. However, finding longest paths is known to be N...
Nutan Limaye, Meena Mahajan, Prajakta Nimbhorkar
IPPS
2010
IEEE
14 years 10 months ago
Varying bandwidth resource allocation problem with bag constraints
We consider the problem of scheduling jobs on a pool of machines. Each job requires multiple machines on which it executes in parallel. For each job, the input specifies release ti...
Venkatesan T. Chakaravarthy, Vinayaka Pandit, Yogi...
EUSFLAT
2001
103views Fuzzy Logic» more  EUSFLAT 2001»
15 years 2 months ago
Possible optimality of solutions in a single machine scheduling problem with fuzzy parameters
A single machine scheduling problem with parameters given in the form of fuzzy numbers is considered. It is assumed that the optimal schedule in such a problem cannot be determine...
Stefan Chanas, Adam Kasperski
81
Voted
CORR
2006
Springer
112views Education» more  CORR 2006»
15 years 21 days ago
Entropy And Vision
In vector quantization the number of vectors used to construct the codebook is always an undefined problem, there is always a compromise between the number of vectors and the quan...
Rami Kanhouche