Sciweavers

1566 search results - page 171 / 314
» On a Cone Covering Problem
Sort
View
AMC
2008
111views more  AMC 2008»
15 years 4 months ago
Chemical agent detector placement methodology
Terrorism is a threat to global peace in our world today and in the future this terrorist threat is surely going to be important. Global terrorist groups have highly sophisticated...
Cevriye Gencer, Emel Kizilkaya Aydogan, Abdullah S...
SIGCSE
2002
ACM
211views Education» more  SIGCSE 2002»
15 years 4 months ago
To java.net and beyond: teaching networking concepts using the Java networking API
This paper covers the use of Java and its API for developing networking programs in an undergraduate computer networks class. Through the use of TCP and UDP sockets provided in th...
Greg Gagne
PODC
2005
ACM
15 years 10 months ago
On the locality of bounded growth
Many large-scale networks such as ad hoc and sensor networks, peer-to-peer networks, or the Internet have the property that the number of independent nodes does not grow arbitrari...
Fabian Kuhn, Thomas Moscibroda, Roger Wattenhofer
ICDM
2007
IEEE
148views Data Mining» more  ICDM 2007»
15 years 8 months ago
Sample Selection for Maximal Diversity
The problem of selecting a sample subset sufficient to preserve diversity arises in many applications. One example is in the design of recombinant inbred lines (RIL) for genetic a...
Feng Pan, Adam Roberts, Leonard McMillan, David Th...
ECCC
2006
134views more  ECCC 2006»
15 years 4 months ago
Derandomizing the AW matrix-valued Chernoff bound using pessimistic estimators and applications
Ahlswede and Winter [AW02] introduced a Chernoff bound for matrix-valued random variables, which is a non-trivial generalization of the usual Chernoff bound for real-valued random...
Avi Wigderson, David Xiao