Sciweavers

6300 search results - page 141 / 1260
» We have it easy, but do we have it right
Sort
View
SODA
2004
ACM
82views Algorithms» more  SODA 2004»
15 years 2 months ago
On finding a guard that sees most and a shop that sells most
We present a near-quadratic time algorithm that computes a point inside a simple polygon P having approximately the largest visibility polygon inside P, and a nearlinear time algo...
Otfried Cheong, Alon Efrat, Sariel Har-Peled
EOR
2006
49views more  EOR 2006»
15 years 1 months ago
A game-theoretic formulation of joint implementation of environmental projects
The aim of this paper is to provide a game-theoretic interpretation of joint implementation in environmental projects and to assess the merit of such a strategy. More specifically...
Michèle Breton, Georges Zaccour, Mehdi Zaha...
AIEDU
2008
174views more  AIEDU 2008»
15 years 1 months ago
Automatic Extraction of Pedagogic Metadata from Learning Content
Annotating learning material with metadata allows easy reusability by different learning/tutoring systems. Several metadata standards have been developed to represent learning obje...
Devshri Roy, Sudeshna Sarkar, Sujoy Ghose
ACSAC
2002
IEEE
15 years 6 months ago
Protecting Data from Malicious Software
Corruption or disclosure of sensitive user documents can be among the most lasting and costly effects of malicious software attacks. Many malicious programs specifically target fi...
Matthew Schmid, Frank Hill, Anup K. Ghosh
ISI
2005
Springer
15 years 6 months ago
Link Analysis Tools for Intelligence and Counterterrorism
Association rule mining is an important data analysis tool that can be applied with success to a variety of domains. However, most association rule mining algorithms seek to discov...
Antonio Badia, Mehmed M. Kantardzic