Sciweavers

2477 search results - page 414 / 496
» Approximate extended formulations
Sort
View
INFOCOM
2010
IEEE
13 years 8 months ago
Cross-layer Optimization for Wireless Networks with Deterministic Channel Models
Abstract—Existing work on cross-layer optimization for wireless networks adopts simple physical-layer models, i.e., treating interference as noise. In this paper, we adopt a dete...
Ziyu Shao, Minghua Chen, Salman Avestimehr, Shuo-Y...
JUCS
2010
100views more  JUCS 2010»
13 years 8 months ago
Spatial Reasoning with Integrated Qualitative-Metric Fuzzy Constraint Networks
Abstract: Qualitative Spatial Reasoning can be greatly improved if metric information can be represented and reasoning can be performed on it; moreover, modelling vagueness and unc...
Marco Falda
NETWORKS
2010
13 years 8 months ago
Probabilistic models for the Steiner Tree problem
We consider a probabilistic model for the Steiner Tree problem. Under this model the problem is defined in a 2-stage setting over a first-stage complete weighted graph having it...
Vangelis Th. Paschos, Orestis Telelis, Vassilis Zi...
PVLDB
2010
110views more  PVLDB 2010»
13 years 8 months ago
Graph Homomorphism Revisited for Graph Matching
In a variety of emerging applications one needs to decide whether a graph G matches another Gp, i.e., whether G has a topological structure similar to that of Gp. The traditional ...
Wenfei Fan, Jianzhong Li, Shuai Ma, Hongzhi Wang, ...
RFIDSEC
2010
13 years 8 months ago
Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol
In September 2009, David and Prasad proposed at MobiSec’09 an interesting new ultralightweight mutual authentication protocol for low-cost RFID tags. In this paper, we present a ...
Julio César Hernández Castro, Pedro ...