Sciweavers

1447 search results - page 132 / 290
» Graphs and Path Equilibria
Sort
View
APSCC
2009
IEEE
15 years 11 months ago
Modeling and testing of cloud applications
What is a cloud application precisely? In this paper, we formulate a computing cloud as a kind of graph, a computing resource such as services or intellectual property access righ...
W. K. Chan, Lijun Mei, Zhenyu Zhang
ISAAC
2003
Springer
96views Algorithms» more  ISAAC 2003»
15 years 9 months ago
On the Geometric Dilation of Finite Point Sets
Let G be an embedded planar graph whose edges may be curves. For two arbitrary points of G, we can compare the length of the shortest path in G connecting them against their Euclid...
Annette Ebbers-Baumann, Ansgar Grüne, Rolf Kl...
DLT
2008
15 years 5 months ago
When Is Reachability Intrinsically Decidable?
A graph H is computable if there is a graph G = (V, E) isomorphic to H where the set V of vertices and the edge relation E are both computable. In this case G is called a computabl...
Barbara F. Csima, Bakhadyr Khoussainov
GEM
2007
15 years 5 months ago
Searching for Snake-In-The-Box Codes With Evolved Pruning Models
We present a method for searching for achordal open paths (snakes) in n-dimensional hypercube graphs (the box). Our technique first obtains a set of exemplary snakes using an evo...
Daniel R. Tuohy, Walter D. Potter, Darren A. Casel...
INFOCOM
2012
IEEE
13 years 6 months ago
Low-stretch greedy embedding heuristics
—Greedy embedding is a graph embedding that makes the simple greedy packet forwarding scheme successful for every source-destination pair. It is desirable that graph embeddings a...
Andrej Cvetkovski, Mark Crovella