Sciweavers

3082 search results - page 197 / 617
» New Bounds for the Controller Problem
Sort
View
ICMCS
2009
IEEE
153views Multimedia» more  ICMCS 2009»
15 years 2 months ago
Network coding-aware rate control and scheduling in wireless networks
Network coding has been recently applied to wireless networks to increase throughput. It is typically implemented as a thin layer between MAC and IP, transparently to higher layer...
Hulya Seferoglu, Athina Markopoulou, Ulas C. Kozat
ICALP
2011
Springer
14 years 8 months ago
Steiner Transitive-Closure Spanners of Low-Dimensional Posets
Given a directed graph G = (V, E) and an integer k ≥ 1, a Steiner k-transitive-closure-spanner (Steiner k-TC-spanner) of G is a directed graph H = (VH , EH ) such that (1) V ⊆ ...
Piotr Berman, Arnab Bhattacharyya, Elena Grigoresc...
120
Voted
DBSEC
2010
137views Database» more  DBSEC 2010»
15 years 6 months ago
Constructing Key Assignment Schemes from Chain Partitions
Abstract. In considering a problem in access control for scalable multimedia formats, we have developed new methods for constructing a key assignment scheme. Our first contribution...
Jason Crampton, Rosli Daud, Keith M. Martin
ICML
2008
IEEE
16 years 5 months ago
Empirical Bernstein stopping
Sampling is a popular way of scaling up machine learning algorithms to large datasets. The question often is how many samples are needed. Adaptive stopping algorithms monitor the ...
Csaba Szepesvári, Jean-Yves Audibert, Volod...
STACS
2009
Springer
15 years 11 months ago
Tractable Structures for Constraint Satisfaction with Truth Tables
The way the graph structure of the constraints influences the complexity of constraint satisfaction problems (CSP) is well understood for bounded-arity constraints. The situation...
Dániel Marx