Sciweavers

2492 search results - page 431 / 499
» On the General Signature Trees
Sort
View
SODA
2008
ACM
96views Algorithms» more  SODA 2008»
13 years 10 months ago
Greedy drawings of triangulations
Greedy Routing is a class of routing algorithms in which the packets are forwarded in a manner that reduces the distance to the destination at every step. In an attempt to provide...
Raghavan Dhandapani
NIPS
2007
13 years 10 months ago
Loop Series and Bethe Variational Bounds in Attractive Graphical Models
Variational methods are frequently used to approximate or bound the partition or likelihood function of a Markov random field. Methods based on mean field theory are guaranteed ...
Erik B. Sudderth, Martin J. Wainwright, Alan S. Wi...
ACID
2006
220views Algorithms» more  ACID 2006»
13 years 10 months ago
Vertex and Edge Covers with Clustering Properties: Complexity and Algorithms
We consider the concepts of a t-total vertex cover and a t-total edge cover (t 1), which generalize the notions of a vertex cover and an edge cover, respectively. A t-total verte...
Henning Fernau, David Manlove
DMIN
2006
115views Data Mining» more  DMIN 2006»
13 years 10 months ago
Data Mining Techniques to Study Therapy Success with Autistic Children
Autism spectrum disorder has become one of the most prevalent developmental disorders, characterized by a wide variety of symptoms. Many children need extensive therapy for years t...
Gondy Leroy, Annika Irmscher, Marjorie H. Charlop-...
FLAIRS
2004
13 years 10 months ago
Towards a Universal Web Wrapper
The wealth of information contained in the world-wide web has created much interest in systems for integrating information from multiple sites. We describe a universal wrapper mac...
Theodore W. Hong, Keith L. Clark