Sciweavers

570 search results - page 55 / 114
» A Connectivity Constraint Using Bridges
Sort
View
VISUALIZATION
1998
IEEE
14 years 2 months ago
Interpolation of triangle hierarchies
We consider interpolation between keyframe hierarchies. We impose a set of weak constraints that allows smooth interpolation between two keyframe hierarchies in an animation or, m...
Axel Friedrich, Konrad Polthier, Markus Schmies
SIAMDM
2010
140views more  SIAMDM 2010»
13 years 8 months ago
Retractions to Pseudoforests
For a fixed graph H, let Ret(H) denote the problem of deciding whether a given input graph is retractable to H. We classify the complexity of Ret(H) when H is a graph (with loops ...
Tomás Feder, Pavol Hell, Peter Jonsson, And...
SASN
2005
ACM
14 years 3 months ago
A key pre-distribution scheme for secure sensor networks using probability density function of node deployment
Pairwise key establishment is a fundamental service provided in secure sensor networks. However, due to resource constraints, establishing pairwise keys is not a trivial task. Rec...
Takashi Ito, Hidenori Ohta, Nori Matsuda, Takeshi ...
JIIS
2006
119views more  JIIS 2006»
13 years 10 months ago
Answering constraint-based mining queries on itemsets using previous materialized results
Abstract In recent years, researchers have begun to study inductive databases, a new generation of databases for leveraging decision support applications. In this context, the user...
Roberto Esposito, Rosa Meo, Marco Botta
GLOBECOM
2007
IEEE
14 years 4 months ago
Using MILP for Optimal Movement Planning in MANETs with Cooperative Mobility
— Rapid-deployment mobile ad-hoc networks (MANETs) are frequently characterized by common overarching mission objectives which make it reasonable to expect some degree of coopera...
Ghassen Ben Brahim, Osama Awwad, Ala I. Al-Fuqaha,...