Sciweavers

2181 search results - page 149 / 437
» The restriction scaffold problem
Sort
View
100
Voted
STOC
2005
ACM
146views Algorithms» more  STOC 2005»
16 years 1 months ago
Approximation algorithms for combinatorial auctions with complement-free bidders
We exhibit three approximation algorithms for the allocation problem in combinatorial auctions with complement free bidders. The running time of these algorithms is polynomial in ...
Shahar Dobzinski, Noam Nisan, Michael Schapira
76
Voted
STOC
2005
ACM
163views Algorithms» more  STOC 2005»
16 years 1 months ago
Undirected ST-connectivity in log-space
We present a deterministic, log-space algorithm that solves st-connectivity in undirected graphs. The previous bound on the space complexity of undirected st-connectivity was log4...
Omer Reingold
88
Voted
ICALP
2009
Springer
16 years 1 months ago
Reachability in Stochastic Timed Games
We define stochastic timed games, which extend two-player timed games with probabilities (following a recent approach by Baier et al), and which extend in a natural way continuous-...
Patricia Bouyer, Vojtech Forejt
86
Voted
PODS
2004
ACM
86views Database» more  PODS 2004»
16 years 27 days ago
Frontiers of Tractability for Typechecking Simple XML Transformations
Typechecking consists of statically verifying whether the output of an XML transformation is always conform to an output type for documents satisfying a given input type. We focus...
Wim Martens, Frank Neven
104
Voted
SAC
2010
ACM
15 years 7 months ago
A simple role mining algorithm
Complex organizations need to establish access control policies in order to manage access to restricted resources. Role Based Access Control paradigm has been introduced in ’90 ...
Carlo Blundo, Stelvio Cimato