Sciweavers

751 search results - page 65 / 151
» The Distinguishing Chromatic Number
Sort
View
ISAAC
2009
Springer
130views Algorithms» more  ISAAC 2009»
15 years 5 months ago
Counting in the Presence of Memory Faults
The faulty memory RAM presented by Finocchi and Italiano [1] is a variant of the RAM model where the content of any memory cell can get corrupted at any time, and corrupted cells c...
Gerth Stølting Brodal, Allan Grønlun...
WIMOB
2008
IEEE
15 years 5 months ago
Movement and Connectivity Algorithms for Location-Based Mobile Social Networks
In this paper we present a novel algorithm aiming at connecting members of a community equipped with mobile devices based on their location. Initially, these users are far from ea...
Bayrem Chelly, Naceur Malouch
ICC
2007
IEEE
133views Communications» more  ICC 2007»
15 years 5 months ago
Machine Learning for Automatic Defence Against Distributed Denial of Service Attacks
— Distributed Denial of Service attacks pose a serious threat to many businesses which rely on constant availability of their network services. Companies like Google, Yahoo and A...
Stefan Seufert, Darragh O'Brien
ICRA
2007
IEEE
151views Robotics» more  ICRA 2007»
15 years 5 months ago
Moving Shadow Detection with Low- and Mid-Level Reasoning
— In this paper, we propose a multi-level shadow identification scheme which is generally applicable without restrictions on the number of light sources, illumination conditions...
Ajay J. Joshi, Stefan Atev, Osama Masoud, Nikolaos...
AGTIVE
2007
Springer
15 years 5 months ago
Ludo: A Case Study for Graph Transformation Tools
In this paper we describe the Ludo case, one of the case studies of the AGTIVE 2007 Tool Contest (see [22]). After summarising the case description, we give an overview of the subm...
Arend Rensink, Alexander Dotor, Claudia Ermel, Ste...