Sciweavers

2976 search results - page 349 / 596
» On the bounded integer programming
Sort
View
TIT
2010
173views Education» more  TIT 2010»
14 years 11 months ago
Asymptotic critical transmission radius for k-connectivity in wireless ad hoc networks
A range assignment to the nodes in a wireless ad hoc network induces a topology in which there is an edge between two nodes if and only if both of them are within each other's...
Peng-Jun Wan, Chih-Wei Yi, Lixin Wang
161
Voted
WIOPT
2011
IEEE
14 years 8 months ago
Open loop optimal control of base station activation for green networks
Abstract—In recent years there has been an increasing awareness that the deployment as well as utilization of new information technology may have some negative ecological impact....
Sreenath Ramanath, Veeraruna Kavitha, Eitan Altman
COMGEO
2012
ACM
14 years 10 days ago
Algorithms for the edge-width of an embedded graph
Let G be an unweighted graph of complexity n embedded in a surface of genus g, orientable or not. We describe improved algorithms to compute a shortest non-contractible and a shor...
Sergio Cabello, Éric Colin de Verdiè...
182
Voted
CVPR
2012
IEEE
13 years 7 months ago
Linear solution to scale invariant global figure ground separation
We propose a novel linear method for scale invariant figure ground separation in images and videos. Figure ground separation is treated as a superpixel labeling problem. We optim...
Hao Jiang
ICALP
2007
Springer
15 years 10 months ago
Model Theory Makes Formulas Large
Gaifman’s locality theorem states that every first-order sentence is equivalent to a local sentence. We show that there is no elementary bound on the length of the local sentenc...
Anuj Dawar, Martin Grohe, Stephan Kreutzer, Nicole...