Sciweavers

927 search results - page 167 / 186
» Detection of Simple Plagiarism in Computer Science Papers
Sort
View
COCO
2007
Springer
85views Algorithms» more  COCO 2007»
15 years 10 months ago
Norms, XOR Lemmas, and Lower Bounds for GF(2) Polynomials and Multiparty Protocols
This paper presents a unified and simple treatment of basic questions concerning two computational models: multiparty communication complexity and GF(2) polynomials. The key is t...
Emanuele Viola, Avi Wigderson
ICALP
2003
Springer
15 years 9 months ago
Anycasting in Adversarial Systems: Routing and Admission Control
Abstract. In this paper we consider the problem of routing packets in dynamically changing networks, using the anycast mode. In anycasting, a packet may have a set of destinations ...
Baruch Awerbuch, André Brinkmann, Christian...
ICALP
2003
Springer
15 years 9 months ago
Similarity Matrices for Pairs of Graphs
Abstract. We introduce a concept of similarity between vertices of directed graphs. Let GA and GB be two directed graphs with respectively nA and nB vertices. We define a nA × nB...
Vincent D. Blondel, Paul Van Dooren
USENIX
1993
15 years 5 months ago
AudioFile: A Network-Transparent System for Distributed Audio Applications
AudioFile is a portable, device-independent, network-transparent system for computer audio systems. to the X Window System, it provides an abstract audio device interface with a s...
Jim Gettys, Thoms M. Levergood, Andrew C. Payne, L...
CORR
2007
Springer
105views Education» more  CORR 2007»
15 years 4 months ago
Relative-Error CUR Matrix Decompositions
Many data analysis applications deal with large matrices and involve approximating the matrix using a small number of “components.” Typically, these components are linear combi...
Petros Drineas, Michael W. Mahoney, S. Muthukrishn...