Sciweavers

962 search results - page 91 / 193
» Efficient Algorithms for Eulerian Extension
Sort
View
IH
2010
Springer
15 years 2 months ago
Short Collusion-Secure Fingerprint Codes against Three Pirates
In this article, we propose a new construction of probabilistic collusion-secure fingerprint codes against up to three pirates and give a theoretical security evaluation. Our pira...
Koji Nuida
CDC
2010
IEEE
158views Control Systems» more  CDC 2010»
14 years 11 months ago
Adaptive-based, scalable design for autonomous multi-robot surveillance
In this paper the problem of positioning a team of mobile robots for a surveillance task in a non-convex environment with obstacles is considered. The robots are equipped with glob...
Alessandro Renzaglia, Lefteris Doitsidis, Agostino...
TEC
2010
126views more  TEC 2010»
14 years 11 months ago
Learning the Large-Scale Structure of the MAX-SAT Landscape Using Populations
A new algorithm for solving MAX-SAT problems is introduced which clusters good solutions, and restarts the search from the closest feasible solution to the centroid of each cluster...
Mohamed Qasem, Adam Prügel-Bennett
ICDE
2007
IEEE
161views Database» more  ICDE 2007»
16 years 5 months ago
Mining Colossal Frequent Patterns by Core Pattern Fusion
Extensive research for frequent-pattern mining in the past decade has brought forth a number of pattern mining algorithms that are both effective and efficient. However, the exist...
Feida Zhu, Xifeng Yan, Jiawei Han, Philip S. Yu, H...
GIS
2006
ACM
16 years 5 months ago
Mining frequent geographic patterns with knowledge constraints
The large amount of patterns generated by frequent pattern mining algorithms has been extensively addressed in the last few years. In geographic pattern mining, besides the large ...
Luis Otávio Alvares, Paulo Martins Engel, S...