Sciweavers

549 search results - page 91 / 110
» On the Complexity of Restricted k-anonymity Problem
Sort
View
ATAL
1997
Springer
15 years 2 months ago
Multi-Agent Coordination through Coalition Formation
Incorporating coalition formation algorithms into agent systems shall be advantageous due to the consequent increase in the overall quality of task performance. Coalition formatio...
Onn Shehory, Katia P. Sycara, Somesh Jha
SIGCOMM
1996
ACM
15 years 1 months ago
Multicasting Protocols for High-Speed, Wormhole-Routing Local Area Networks
Wormhole routing LANs are emerging as an effective solution for high-bandwidth, low-latency interconnects in distributed computing and cluster computing applications. An important...
Mario Gerla, Prasasth Palnati, Simon Walton
SMA
1995
ACM
176views Solid Modeling» more  SMA 1995»
15 years 1 months ago
Incremental algorithms for collision detection between solid models
: Fast and accurate collision detection between general solid models is a fundamental problem in solid modeling, robotics, animation and computer-simulated environments. Most of th...
Madhav K. Ponamgi, Dinesh Manocha, Ming C. Lin
ECCV
2010
Springer
15 years 1 months ago
Exploring Ambiguities for Monocular Non-Rigid Shape Estimation
Recovering the 3D shape of deformable surfaces from single images is difficult because many different shapes have very similar projections. This is commonly addressed by restricti...
CSL
2008
Springer
14 years 11 months ago
An Infinite Automaton Characterization of Double Exponential Time
Infinite-state automata are a new invention: they are automata that have an infinite number of states represented by words, transitions defined using rewriting, and with sets of in...
Salvatore La Torre, P. Madhusudan, Gennaro Parlato