Sciweavers

2179 search results - page 344 / 436
» Symmetry within Solutions
Sort
View
VLDB
1998
ACM
82views Database» more  VLDB 1998»
15 years 4 months ago
Resource Scheduling for Composite Multimedia Objects
Scheduling algorithms for composite multimedia presentations need to ensure that the user-defined synchronization constraints for the various presentation components are met. This...
Minos N. Garofalakis, Yannis E. Ioannidis, Banu &O...
CPM
1993
Springer
154views Combinatorics» more  CPM 1993»
15 years 4 months ago
On Suboptimal Alignments of Biological Sequences
It is widely accepted that the optimal alignment between a pair of proteins or nucleic acid sequences that minimizes the edit distance may not necessarily re ect the correct biolog...
Dalit Naor, Douglas L. Brutlag
102
Voted
COMPGEOM
2007
ACM
15 years 4 months ago
Guard placement for efficient point-in-polygon proofs
We consider the problem of placing a small number of angle guards inside a simple polygon P so as to provide efficient proofs that any given point is inside P. Each angle guard vi...
David Eppstein, Michael T. Goodrich, Nodari Sitchi...
82
Voted
ICC
2007
IEEE
15 years 4 months ago
The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment
In our previous work, we proposed a distributed server architecture to deliver multi-party immersive voice communication service to mobile clients (e.g. Sony PSP) accessing a Distr...
Ying Peng Que, Farzad Safaei, Paul Boustead
123
Voted
FM
2006
Springer
153views Formal Methods» more  FM 2006»
15 years 4 months ago
Formal Methods and Cryptography
Security-critical systems are an important application area for formal methods. However, such systems often contain cryptographic subsystems. The natural definitions of these subsy...
Michael Backes, Birgit Pfitzmann, Michael Waidner