Sciweavers

7840 search results - page 136 / 1568
» On generalized Ramsey numbers
Sort
View
NSPW
2003
ACM
14 years 4 months ago
Owner-controlled information
Large-scale data breaches exposing sensitive personal information are becoming commonplace. For numerous reasons, conventional personal (identification) information leaks from da...
Carrie Gates, Jacob Slonim
CORR
2008
Springer
72views Education» more  CORR 2008»
13 years 11 months ago
Longest paths in Planar DAGs in Unambiguous Logspace
Reachability and distance computation are known to be NL-complete in general graphs, but within UL co-UL if the graphs are planar. However, finding longest paths is known to be N...
Nutan Limaye, Meena Mahajan, Prajakta Nimbhorkar
IPPS
2010
IEEE
13 years 8 months ago
Varying bandwidth resource allocation problem with bag constraints
We consider the problem of scheduling jobs on a pool of machines. Each job requires multiple machines on which it executes in parallel. For each job, the input specifies release ti...
Venkatesan T. Chakaravarthy, Vinayaka Pandit, Yogi...
EUSFLAT
2001
103views Fuzzy Logic» more  EUSFLAT 2001»
14 years 5 days ago
Possible optimality of solutions in a single machine scheduling problem with fuzzy parameters
A single machine scheduling problem with parameters given in the form of fuzzy numbers is considered. It is assumed that the optimal schedule in such a problem cannot be determine...
Stefan Chanas, Adam Kasperski
CORR
2006
Springer
112views Education» more  CORR 2006»
13 years 10 months ago
Entropy And Vision
In vector quantization the number of vectors used to construct the codebook is always an undefined problem, there is always a compromise between the number of vectors and the quan...
Rami Kanhouche