Sciweavers

398 search results - page 28 / 80
» Critical exponents of graphs
Sort
View
CORR
2011
Springer
169views Education» more  CORR 2011»
13 years 1 months ago
Percolation in the Secrecy Graph
— Secrecy graphs model the connectivity of wireless networks under secrecy constraints. Directed edges in the graph are present whenever a node can talk to another node securely ...
Amites Sarkar, Martin Haenggi
COMBINATORICA
2008
123views more  COMBINATORICA 2008»
13 years 8 months ago
Counting canonical partitions in the random graph
Algorithms are given for computing the number of n-element diagonal sets and the number of n-element strongly diagonal sets of binary sequences of length at most 2n - 2. The first...
Jean A. Larson
ECEASST
2010
13 years 7 months ago
Checking Graph-Transformation Systems for Confluence
d Abstract) Detlef Plump Abstract. In general, it is undecidable whether a terminating graphtransformation system is confluent or not. We introduce the class of coverable hypergrap...
Detlef Plump
ICIAP
2003
ACM
14 years 9 months ago
A topological approach for segmenting human body shape
Segmentation of 3D human body is a very challenging problem in applications exploiting human scan data. To tackle this problem, this paper proposes a topological approach based on...
Yijun Xiao, Naoufel Werghi, Paul Siebert
ECAL
2003
Springer
14 years 2 months ago
Visualizing Evolutionary Dynamics of Self-Replicators Using Graph-Based Genealogy
We present a general method for evaluating and visualizing evolutionary dynamics of self-replicators using a graph-based representation for genealogy. Through a transformation from...
Chris Salzberg, Antony Antony, Hiroki Sayama