Sciweavers

2283 search results - page 264 / 457
» Bounds of Graph Characteristics
Sort
View
PAMI
2006
145views more  PAMI 2006»
13 years 8 months ago
Convergent Tree-Reweighted Message Passing for Energy Minimization
Algorithms for discrete energy minimization are of fundamental importance in computer vision. In this paper we focus on the recent technique proposed by Wainwright et al. [33] - t...
Vladimir Kolmogorov
ICALP
2011
Springer
12 years 11 months ago
On the Advice Complexity of the k-Server Problem
Competitive analysis is the established tool for measuring the output quality of algorithms that work in an online environment. Recently, the model of advice complexity has been in...
Hans-Joachim Böckenhauer, Dennis Komm, Rastis...
ICIP
2006
IEEE
14 years 2 months ago
Public Key Watermarking for Reversible Image Authentication
In this paper, we propose a new public key watermarking scheme for reversible image authentication where if the image is authentic, the distortion due to embedding can be complete...
Sang-Kwang Lee, Young-Ho Suh, Yo-Sung Ho
CAV
2003
Springer
116views Hardware» more  CAV 2003»
14 years 1 months ago
Reasoning with Temporal Logic on Truncated Paths
We consider the problem of reasoning with linear temporal logic on truncated paths. A truncated path is a path that is finite, but not necessarily maximal. Truncated paths arise n...
Cindy Eisner, Dana Fisman, John Havlicek, Yoad Lus...
FSTTCS
2006
Springer
13 years 12 months ago
Fast Exponential Algorithms for Maximum r-Regular Induced Subgraph Problems
Given a graph G=(V, E) on n vertices, the MAXIMUM r-REGULAR INDUCED SUBGRAPH (M-r-RIS) problems ask for a maximum sized subset of vertices R V such that the induced subgraph on R,...
Sushmita Gupta, Venkatesh Raman, Saket Saurabh