Sciweavers

1081 search results - page 66 / 217
» Working with the LR Degrees
Sort
View
94
Voted
SSS
2005
Springer
15 years 6 months ago
A Snap-Stabilizing DFS with a Lower Space Requirement
Abstract. A snap-stabilizing protocol, starting from any arbitrary initial configuration, always behaves according to its specification. In [4], we presented the first snap-stab...
Alain Cournier, Stéphane Devismes, Vincent ...
WEA
2005
Springer
154views Algorithms» more  WEA 2005»
15 years 6 months ago
Experimental Evaluation of the Greedy and Random Algorithms for Finding Independent Sets in Random Graphs
This work is motivated by the long-standing open problem of designing a polynomial-time algorithm that with high probability constructs an asymptotically maximum independent set in...
Mark K. Goldberg, D. Hollinger, Malik Magdon-Ismai...
111
Voted
ESORICS
2004
Springer
15 years 6 months ago
A Vector Model of Trust for Developing Trustworthy Systems
All security services rely to a great extent on some notion of trust. However, even today, there is no accepted formalism or technique for the specification of trust and for reaso...
Indrajit Ray, Sudip Chakraborty
GECCO
2004
Springer
140views Optimization» more  GECCO 2004»
15 years 6 months ago
A Sensitivity Analysis of a Cooperative Coevolutionary Algorithm Biased for Optimization
Abstract. Recent theoretical work helped explain certain optimizationrelated pathologies in cooperative coevolutionary algorithms (CCEAs). Such explanations have led to adopting sp...
Liviu Panait, R. Paul Wiegand, Sean Luke
ICIAR
2004
Springer
15 years 6 months ago
Three-Dimensional Face Recognition: A Fishersurface Approach
Previous work has shown that principal component analysis (PCA) of three-dimensional face models can be used to perform recognition to a high degree of accuracy. However, experimen...
Thomas Heseltine, Nick Pears, Jim Austin