Sciweavers

725 search results - page 130 / 145
» Bounding Degrees on RPL
Sort
View
TPDS
1998
110views more  TPDS 1998»
13 years 9 months ago
On Exploiting Task Duplication in Parallel Program Scheduling
—One of the main obstacles in obtaining high performance from message-passing multicomputer systems is the inevitable communication overhead which is incurred when tasks executin...
Ishfaq Ahmad, Yu-Kwong Kwok
SODA
2010
ACM
142views Algorithms» more  SODA 2010»
13 years 8 months ago
Speeding up random walks with neighborhood exploration
We consider the following marking process (rw-rand) made by a random walk on an undirected graph G. Upon arrival at a vertex v, it marks v if unmarked and otherwise it marks a ran...
Petra Berenbrink, Colin Cooper, Robert Elsaesser, ...
ISVD
2010
IEEE
13 years 8 months ago
Guaranteed Quality Tetrahedral Delaunay Meshing for Medical Images
—In this paper, we present a Delaunay refinement algorithm for meshing 3D medical images. We prove that (a) all the tetrahedra of the output mesh have radius-edge ratio less tha...
Panagiotis A. Foteinos, Andrey N. Chernikov, Nikos...
RSA
2010
91views more  RSA 2010»
13 years 8 months ago
The second largest component in the supercritical 2D Hamming graph
The 2-dimensional Hamming graph H(2, n) consists of the n2 vertices (i, j), 1 ≤ i, j ≤ n, two vertices being adjacent when they share a common coordinate. We examine random sub...
Remco van der Hofstad, Malwina J. Luczak, Joel Spe...
VTC
2010
IEEE
175views Communications» more  VTC 2010»
13 years 8 months ago
Incremental Relaying with Imperfect Feedback in Wireless Cooperative Networks
—We present the ǫ-outage capacity in the low signal-to-noise ratio (SNR) regime of an incremental relaying network. The network consists of one source, one destination, and two ...
Tobias Renk, Holger Jaekel, Friedrich Jondral