Sciweavers

121 search results - page 13 / 25
» Upper Bounds on Number of Steals in Rooted Trees
Sort
View
ISMVL
2006
IEEE
117views Hardware» more  ISMVL 2006»
15 years 3 months ago
Representations of Elementary Functions Using Binary Moment Diagrams
This paper considers representations for elementary functions such as polynomial, trigonometric, logarithmic, square root, and reciprocal functions. These real valued functions ar...
Tsutomu Sasao, Shinobu Nagayama
DM
2002
86views more  DM 2002»
14 years 9 months ago
A chip-firing game and Dirichlet eigenvalues
We consider a variation of the chip-firing game in a induced subgraph S of a graph G. Starting from a given chip configuration, if a vertex v has at least as many chips as its deg...
Fan R. K. Chung, Robert B. Ellis
DEXAW
2007
IEEE
124views Database» more  DEXAW 2007»
15 years 1 months ago
XML Query Optimisation: Specify your Selectivity
The problem of efficiently evaluating XPath and XQuery queries has become increasingly significant since more and more XML data is stored in its native form. We propose a novel op...
Sven Hartmann, Sebastian Link
CORR
2011
Springer
155views Education» more  CORR 2011»
14 years 4 months ago
Subexponential convergence for information aggregation on regular trees
— We consider the decentralized binary hypothesis testing problem on trees of bounded degree and increasing depth. For a regular tree of depth t and branching factor k ≥ 2, we ...
Yashodhan Kanoria, Andrea Montanari
IPPS
2007
IEEE
15 years 3 months ago
Strategies for Replica Placement in Tree Networks
In this paper, we discuss and compare several policies to place replicas in tree networks, subject to server capacity constraints. The client requests are known beforehand, while ...
Anne Benoit, Veronika Rehn, Yves Robert