Sciweavers

2168 search results - page 388 / 434
» Using Approximation Hardness to Achieve Dependable Computati...
Sort
View
CORR
2010
Springer
249views Education» more  CORR 2010»
13 years 10 months ago
Lower Bounds on Near Neighbor Search via Metric Expansion
In this paper we show how the complexity of performing nearest neighbor (NNS) search on a metric space is related to the expansion of the metric space. Given a metric space we loo...
Rina Panigrahy, Kunal Talwar, Udi Wieder
MOBIHOC
2005
ACM
14 years 9 months ago
Toward resilient security in wireless sensor networks
Node compromise poses severe security threats in wireless sensor networks. Unfortunately, existing security designs can address only a small, fixed threshold number of compromised...
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William A....
ICS
2009
Tsinghua U.
14 years 4 months ago
MPI-aware compiler optimizations for improving communication-computation overlap
Several existing compiler transformations can help improve communication-computation overlap in MPI applications. However, traditional compilers treat calls to the MPI library as ...
Anthony Danalis, Lori L. Pollock, D. Martin Swany,...
COCO
2009
Springer
105views Algorithms» more  COCO 2009»
14 years 4 months ago
Planar Graph Isomorphism is in Log-Space
Graph Isomorphism is the prime example of a computational problem with a wide difference between the best known lower and upper bounds on its complexity. There is a significant ...
Samir Datta, Nutan Limaye, Prajakta Nimbhorkar, Th...
MM
2009
ACM
217views Multimedia» more  MM 2009»
14 years 4 months ago
Label to region by bi-layer sparsity priors
In this work, we investigate how to automatically reassign the manually annotated labels at the image-level to those contextually derived semantic regions. First, we propose a bi-...
Xiaobai Liu, Bin Cheng, Shuicheng Yan, Jinhui Tang...