Sciweavers

5799 search results - page 888 / 1160
» Position Paper
Sort
View
NETWORKING
2007
15 years 6 months ago
On the Resilient Overlay Topology Formation in Multi-hop Wireless Networks
In this paper, we study the problem of how to design overlay topologies in multi-hop wireless networks such that the overlays achieve perfect resilience, in terms of all cooperativ...
Fei Xing, Wenye Wang
NETWORKING
2007
15 years 6 months ago
Maximum Energy Welfare Routing in Wireless Sensor Networks
Most routing algorithms for sensor networks focus on finding energy efficient paths to prolong the lifetime of sensor networks. As a result, the sensors on the efficient paths are ...
Changsoo Ok, Prasenjit Mitra, Seokcheon Lee, Sound...
SODA
2008
ACM
128views Algorithms» more  SODA 2008»
15 years 6 months ago
Analysis of greedy approximations with nonsubmodular potential functions
In this paper, we present two techniques to analyze greedy approximation with nonsubmodular functions restricted submodularity and shifted submodularity. As an application of the ...
Ding-Zhu Du, Ronald L. Graham, Panos M. Pardalos, ...
SODA
2008
ACM
184views Algorithms» more  SODA 2008»
15 years 6 months ago
On the approximability of influence in social networks
In this paper, we study the spread of influence through a social network, in a model initially studied by Kempe, Kleinberg and Tardos [14, 15]: We are given a graph modeling a soc...
Ning Chen
TRECVID
2008
15 years 6 months ago
Florida International University and University of Miami TRECVID 2008 - High Level Feature Extraction
This paper describes the FIU-UM group TRECVID 2008 high level feature extraction task submission. We have used a correlation based video semantic concept detection system for this...
Guy Ravitz, Lin Lin, Mei-Ling Shyu, Michael Armell...