Sciweavers

2210 search results - page 395 / 442
» CLEF 2001 - Overview of Results
Sort
View
SODA
2001
ACM
188views Algorithms» more  SODA 2001»
13 years 10 months ago
Approximation algorithms for the 0-extension problem
In the 0-extension problem, we are given a weighted graph with some nodes marked as terminals and a semimetric on the set of terminals. Our goal is to assign the rest of the nodes ...
Gruia Calinescu, Howard J. Karloff, Yuval Rabani
WSC
2004
13 years 10 months ago
Automation of Human Decision Processes for Route Completion for Airspace Design Analysis
This paper describes an algorithm for approximating missing data in air traffic routes thereby allowing the lengths of different routes to be compared for our simulation analyses....
Lisa A. Schaefer
JACM
2007
132views more  JACM 2007»
13 years 8 months ago
Dynamic ordered sets with exponential search trees
We introduce exponential search trees as a novel technique for converting static polynomial space search structures for ordered sets into fully-dynamic linear space data structure...
Arne Andersson, Mikkel Thorup
JASIS
2007
110views more  JASIS 2007»
13 years 8 months ago
Google Scholar citations and Google Web/URL citations: A multi-discipline exploratory analysis
In this paper we introduce a new data gathering method “Web/URL Citation” and use it and Google Scholar as a basis to compare traditional and Web-based citation patterns acros...
Kayvan Kousha, Mike Thelwall
IACR
2011
104views more  IACR 2011»
12 years 8 months ago
Collusion Resistant Obfuscation and Functional Re-encryption
Program Obfuscation is the problem of transforming a program into one which is functionally equivalent, yet whose inner workings are completely unintelligible to an adversary. Des...
Nishanth Chandran, Melissa Chase, Vinod Vaikuntana...