Sciweavers

1327 search results - page 191 / 266
» Path following algorithm for the graph matching problem
Sort
View
113
Voted
KDD
2010
ACM
240views Data Mining» more  KDD 2010»
15 years 5 months ago
Diagnosing memory leaks using graph mining on heap dumps
Memory leaks are caused by software programs that prevent the reclamation of memory that is no longer in use. They can cause significant slowdowns, exhaustion of available storag...
Evan K. Maxwell, Godmar Back, Naren Ramakrishnan
PDCAT
2005
Springer
15 years 7 months ago
Approximating Spanning Trees with Inner Nodes Cost
We consider the practical NP-complete problem of finding a minimum weight spanning tree with both edge weights and inner nodes weights. We present two polynomial time algorithms ...
Rudolf Fleischer, Qi Ge, Jian Li, Shijun Tian, Hai...
102
Voted
STOC
2010
ACM
170views Algorithms» more  STOC 2010»
15 years 6 months ago
Connectivity oracles for failure prone graphs
Dynamic graph connectivity algorithms have been studied for many years, but typically in the most general possible setting, where the graph can evolve in completely arbitrary ways...
Ran Duan, Seth Pettie
115
Voted
IWOCA
2009
Springer
152views Algorithms» more  IWOCA 2009»
15 years 8 months ago
Edge-Simple Circuits through 10 Ordered Vertices in Square Grids
A circuit in a simple undirected graph G = (V, E) is a sequence of vertices {v1, v2, . . . , vk+1} such that v1 = vk+1 and {vi, vi+i} ∈ E for i = 1, . . . , k. A circuit C is sai...
David Coudert, Frédéric Giroire, Ign...
KDD
2010
ACM
252views Data Mining» more  KDD 2010»
15 years 5 months ago
Fast query execution for retrieval models based on path-constrained random walks
Many recommendation and retrieval tasks can be represented as proximity queries on a labeled directed graph, with typed nodes representing documents, terms, and metadata, and labe...
Ni Lao, William W. Cohen