Sciweavers

2430 search results - page 468 / 486
» Computing Tutte Polynomials
Sort
View
RTCSA
2006
IEEE
14 years 1 months ago
Instruction Scheduling with Release Times and Deadlines on ILP Processors
ILP (Instruction Level Parallelism) processors are being increasingly used in embedded systems. In embedded systems, instructions may be subject to timing constraints. An optimisi...
Hui Wu, Joxan Jaffar, Jingling Xue
WS
2006
ACM
14 years 1 months ago
Modeling Ad-hoc rushing attack in a negligibility-based security framework
In this paper, we propose a formal notion of network security for ad hoc networks. We adopt a probabilistic security framework, that is, security is defined by a polynomially bou...
Jiejun Kong, Xiaoyan Hong, Mario Gerla
BROADNETS
2005
IEEE
14 years 1 months ago
Dual-link failure resiliency through backup link mutual exclusion
— Networks employ link protection to achieve fast recovery from link failures. While the first link failure can be protected using link protection, there are several alternative...
Amit Chandak, Srinivasan Ramasubramanian
ICDM
2005
IEEE
125views Data Mining» more  ICDM 2005»
14 years 1 months ago
Alternate Representation of Distance Matrices for Characterization of Protein Structure
The most suitable method for the automated classification of protein structures remains an open problem in computational biology. In order to classify a protein structure with an...
Keith Marsolo, Srinivasan Parthasarathy
ICALP
2005
Springer
14 years 1 months ago
The Generalized Deadlock Resolution Problem
In this paper we initiate the study of the AND-OR directed feedback vertex set problem from the viewpoint of approximation algorithms. This AND-OR feedback vertex set problem is m...
Kamal Jain, Mohammad Taghi Hajiaghayi, Kunal Talwa...