Sciweavers

2536 search results - page 392 / 508
» Constructing Optimal Highways
Sort
View
LATIN
2004
Springer
14 years 3 months ago
Embracing the Giant Component
Consider a game in which edges of a graph are provided a pair at a time, and the player selects one edge from each pair, attempting to construct a graph with a component as large ...
Abraham Flaxman, David Gamarnik, Gregory B. Sorkin
SACRYPT
2004
Springer
125views Cryptology» more  SACRYPT 2004»
14 years 3 months ago
Password Based Key Exchange with Mutual Authentication
A reasonably efficient password based key exchange (KE) protocol with provable security without random oracle was recently proposed by Katz, et al. [18] and later by Gennaro and Li...
Shaoquan Jiang, Guang Gong
SIGADA
2004
Springer
14 years 3 months ago
Comparative analysis of genetic algorithm implementations
Genetic Algorithms provide computational procedures that are modeled on natural genetic system mechanics, whereby a coded solution is “evolved” from a set of potential solutio...
Robert Soricone, Melvin Neville
WAIM
2004
Springer
14 years 3 months ago
Estimating the Selectivity of XML Path Expression with Predicates by Histograms
Selectivity estimation of path expressions in querying XML data plays an important role in query optimization. A path expression may contain multiple branches with predicates, each...
Yu Wang, Haixun Wang, Xiaofeng Meng, Shan Wang
CGI
2003
IEEE
14 years 3 months ago
Interactive Transfer Function Modification For Volume Rendering Using Compressed Sample Runs
This paper describes a software-based method for interactive transfer function modification. Our approach exploits the fact that, in general, a user will rarely want to modify the...
Vivek Srivastava, Uday Chebrolu, Klaus Mueller