Sciweavers

3396 search results - page 621 / 680
» Tree representations of graphs
Sort
View
CCS
2007
ACM
14 years 4 months ago
Topological analysis of network attack vulnerability
: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
Sushil Jajodia
CPAIOR
2007
Springer
14 years 4 months ago
Best-First AND/OR Search for 0/1 Integer Programming
Abstract. AND/OR search spaces are a unifying paradigm for advanced algorithmic schemes for graphical models. The main virtue of this representation is its sensitivity to the struc...
Radu Marinescu 0002, Rina Dechter
WEBI
2007
Springer
14 years 4 months ago
Blog Community Discovery and Evolution Based on Mutual Awareness Expansion
There are information needs involving costly decisions that cannot be efficiently satisfied through conventional web search engines. Alternately, community centric search can prov...
Yu-Ru Lin, Hari Sundaram, Yun Chi, Jun'ichi Tatemu...
WINE
2007
Springer
126views Economy» more  WINE 2007»
14 years 4 months ago
A Theory of Loss-Leaders: Making Money by Pricing Below Cost
We consider the problem of assigning prices to goods of fixed marginal cost in order to maximize revenue in the presence of single-minded customers. We focus in particular on the...
Maria-Florina Balcan, Avrim Blum, T.-H. Hubert Cha...
ICRA
2006
IEEE
104views Robotics» more  ICRA 2006»
14 years 4 months ago
Graphical Singularity Analysis of Planar Parallel Manipulators
- This paper introduces a new approach to identify singularities of planar parallel manipulators (PPMs). This method is based on Maxwell’s reciprocal figure theory which establis...
Amir Degani, Alon Wolf