Sciweavers

486 search results - page 97 / 98
» Improved upper bounds for 3-SAT
Sort
View
CASES
2010
ACM
13 years 6 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
DLOG
2010
13 years 6 months ago
Optimizing Algebraic Tableau Reasoning for SHOQ: First Experimental Results
In this paper we outline an algebraic tableau algorithm for the DL SHOQ, which supports more informed reasoning due to the use of semantic partitioning and integer programming. We ...
Jocelyne Faddoul, Volker Haarslev
CORR
2011
Springer
191views Education» more  CORR 2011»
13 years 3 months ago
On Approximating Four Covering and Packing Problems
In this paper, we consider approximability issues of the following four problems: triangle packing, full sibling reconstruction, maximum profit coverage and 2-coverage. All of th...
Mary V. Ashley, Tanya Y. Berger-Wolf, Piotr Berman...
TMC
2011
149views more  TMC 2011»
13 years 3 months ago
Context-Based Network Estimation for Energy-Efficient Ubiquitous Wireless Connectivity
— Context information brings new opportunities for efficient and effective system resource management of mobile devices. In this work we focus on the use of context information t...
Ahmad Rahmati, Lin Zhong
STOC
2003
ACM
114views Algorithms» more  STOC 2003»
14 years 8 months ago
Testing subgraphs in directed graphs
Let H be a fixed directed graph on h vertices, let G be a directed graph on n vertices and suppose that at least n2 edges have to be deleted from it to make it H-free. We show tha...
Noga Alon, Asaf Shapira