Sciweavers

5606 search results - page 1085 / 1122
» Randomization Techniques for Graphs.
Sort
View
IANDC
2010
84views more  IANDC 2010»
13 years 8 months ago
Underapproximation for model-checking based on universal circuits
For two naturals m, n such that m < n, we show how to construct a circuit C with m inputs and n outputs, that has the following property: for some 0 ≤ k ≤ m, the circuit de...
Arie Matsliah, Ofer Strichman
INFOCOM
2010
IEEE
13 years 8 months ago
Distributed Opportunistic Scheduling for Ad-Hoc Communications Under Delay Constraints
—With the convergence of multimedia applications and wireless communications, there is an urgent need for developing new scheduling algorithms to support real-time traffic with ...
Sheu-Sheu Tan, Dong Zheng, Junshan Zhang, James R....
INFOCOM
2010
IEEE
13 years 8 months ago
Joint Power and Secret Key Queue Management for Delay Limited Secure Communication
—In recent years, the famous wiretap channel has been revisited by many researchers and information theoretic secrecy has become an active area of research in this setting. In th...
Onur Güngör 0002, Jian Tan, Can Emre Kok...
ISBRA
2010
Springer
13 years 8 months ago
A Consensus Tree Approach for Reconstructing Human Evolutionary History and Detecting Population Substructure
The random accumulation of variations in the human genome over time implicitly encodes a history of how human populations have arisen, dispersed, and intermixed since we emerged as...
Ming-Chi Tsai, Guy E. Blelloch, R. Ravi, Russell S...
PVLDB
2010
112views more  PVLDB 2010»
13 years 8 months ago
Querying Probabilistic Information Extraction
Recently, there has been increasing interest in extending relational query processing to include data obtained from unstructured sources. A common approach is to use stand-alone I...
Daisy Zhe Wang, Michael J. Franklin, Minos N. Garo...
« Prev « First page 1085 / 1122 Last » Next »