Sciweavers

549 search results - page 52 / 110
» On the Complexity of Restricted k-anonymity Problem
Sort
View
CORR
2008
Springer
141views Education» more  CORR 2008»
14 years 10 months ago
Model checking memoryful linear-time logics over one-counter automata
We study complexity of the model-checking problems for LTL with registers (also known as freeze LTL and written LTL ) and for first-order logic with data equality tests (written F...
Stéphane Demri, Ranko Lazic, Arnaud Sangnie...
LICS
2005
IEEE
15 years 3 months ago
Model-Checking Hierarchical Structures
Hierarchical graph definitions allow a modular description of graphs using modules for the specification of repeated substructures. Beside this modularity, hierarchical graph de...
Markus Lohrey
GECCO
2006
Springer
135views Optimization» more  GECCO 2006»
15 years 1 months ago
The no free lunch and realistic search algorithms
The No-Free-Lunch theorems (NFLTs) are criticized for being too general to be of any relevance to the real world scenario. This paper investigates, both formally and empirically, ...
Yossi Borenstein, Riccardo Poli
APVIS
2007
14 years 11 months ago
Labeling collinear sites
We consider a map labeling problem, where the sites to be labeled are restricted on a line L. This is quite common e.g. in schematized maps for road or subway networks. Each site ...
Michael A. Bekos, Michael Kaufmann, Antonios Symvo...
AAAI
2006
14 years 11 months ago
A Quadratic Propagator for the Inter-Distance Constraint
We present a new propagator achieving bound consistency for the INTER-DISTANCE constraint. This constraint ensures that, among a set of variables X1, . . . , Xn, the difference be...
Claude-Guy Quimper, Alejandro López-Ortiz, ...