Sciweavers

2294 search results - page 283 / 459
» From Path Graphs to Directed Path Graphs
Sort
View
164
Voted
SPIRE
2005
Springer
15 years 8 months ago
Using the k-Nearest Neighbor Graph for Proximity Searching in Metric Spaces
Proximity searching consists in retrieving from a database, objects that are close to a query. For this type of searching problem, the most general model is the metric space, where...
Rodrigo Paredes, Edgar Chávez
162
Voted
GLOBECOM
2010
IEEE
14 years 12 months ago
Circulant-Graph-Based Fault-Tolerant Routing for All-Optical WDM LANs
High demands in data delivery latency and communication reliability encourage the use of fault-toleranceenhanced all-optical WDM networks. Low latency is satisfied by setting up a ...
Dexiang Wang, Janise McNair
99
Voted
CAV
2010
Springer
161views Hardware» more  CAV 2010»
15 years 6 months ago
Directed Proof Generation for Machine Code
We present the algorithms used in MCVETO (Machine-Code VErification TOol), a tool to check whether a stripped machinecode program satisfies a safety property. The verification p...
Aditya V. Thakur, Junghee Lim, Akash Lal, Amanda B...
143
Voted
WAIM
2004
Springer
15 years 8 months ago
Mining Inheritance Rules from Genealogical Data
Data mining extracts implicit, previously unknown and potentially useful information from databases. Many approaches have been proposed to extract information, and one of the most ...
Yen-Liang Chen, Jing-Tin Lu
DAM
2010
81views more  DAM 2010»
15 years 2 months ago
The k-in-a-tree problem for graphs of girth at least k
For all integers k 3, we give an O(n4 ) time algorithm for the problem whose instance is a graph G of girth at least k together with k vertices and whose question is "Does G...
W. Liu, Nicolas Trotignon