Sciweavers

6598 search results - page 24 / 1320
» Graph Theory with Applications
Sort
View
137
Voted
COMPGEOM
2004
ACM
15 years 9 months ago
Deformable spanners and applications
For a set S of points in Rd, an s-spanner is a graph on S such that any pair of points is connected via some path in the spanner whose total length is at most s times the Euclidea...
Jie Gao, Leonidas J. Guibas, An Nguyen
124
Voted
FOSSACS
2008
Springer
15 years 5 months ago
Deriving Bisimulation Congruences in the Presence of Negative Application Conditions
In recent years there have been several approaches for the automatic derivation of labels from an unlabeled reactive system. This can be done in such a way that the resulting bisim...
Guilherme Rangel, Barbara König, Hartmut Ehri...
ESA
1998
Springer
169views Algorithms» more  ESA 1998»
15 years 8 months ago
Augmenting Suffix Trees, with Applications
Information retrieval and data compression are the two main application areas where the rich theory of string algorithmics plays a fundamental role. In this paper, we consider one ...
Yossi Matias, S. Muthukrishnan, Süleyman Cenk...
136
Voted
ML
2006
ACM
143views Machine Learning» more  ML 2006»
15 years 3 months ago
Mathematical applications of inductive logic programming
The application of Inductive Logic Programming to scientific datasets has been highly successful. Such applications have led to breakthroughs in the domain of interest and have dri...
Simon Colton, Stephen Muggleton
164
Voted
DBSEC
2009
163views Database» more  DBSEC 2009»
15 years 4 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...