Sciweavers

160 search results - page 15 / 32
» Approximability of Manipulating Elections
Sort
View
ISSAC
2007
Springer
111views Mathematics» more  ISSAC 2007»
14 years 3 months ago
Numerical optimization in hybrid symbolic-numeric computation
Approximate symbolic computation problems can be formulated as constrained or unconstrained optimization problems, for example: GCD [3, 8, 12, 13, 23], factorization [5, 10], and ...
Lihong Zhi
ICDCSW
2005
IEEE
14 years 3 months ago
Increasing Attack Resiliency of Wireless Ad Hoc and Sensor Networks
An ad hoc or sensor network that is employed for security sensitive applications is expected to tolerate a certain quantity of maliciously behaving nodes. Algorithms must be desig...
Harald Vogt
RT
2001
Springer
14 years 2 months ago
Artistic Composition for Image Creation
Altering the viewing parameters of a 3D object results in computer graphics images of varying quality. One aspect of image quality is the composition of the image. While the esthet...
Bruce Gooch, Erik Reinhard, Chris Moulding, Peter ...
KDD
2012
ACM
212views Data Mining» more  KDD 2012»
12 years 3 days ago
Fast bregman divergence NMF using taylor expansion and coordinate descent
Non-negative matrix factorization (NMF) provides a lower rank approximation of a matrix. Due to nonnegativity imposed on the factors, it gives a latent structure that is often mor...
Liangda Li, Guy Lebanon, Haesun Park
ICALP
2010
Springer
14 years 2 months ago
Network Design via Core Detouring for Problems without a Core
Some of the currently best-known approximation algorithms for network design are based on random sampling. One of the key steps of such algorithms is connecting a set of source nod...
Fabrizio Grandoni, Thomas Rothvoß