Sciweavers

475 search results - page 65 / 95
» Z3-Connectivity with Independent Number 2
Sort
View
SWAT
2000
Springer
90views Algorithms» more  SWAT 2000»
14 years 1 months ago
Efficient Expected-Case Algorithms for Planar Point Location
Planar point location is among the most fundamental search problems in computational geometry. Although this problem has been heavily studied from the perspective of worst-case que...
Sunil Arya, Siu-Wing Cheng, David M. Mount, Ramesh...
TCS
2008
13 years 10 months ago
Algorithms for computing variants of the longest common subsequence problem
The longest common subsequence(LCS) problem is one of the classical and wellstudied problems in computer science. The computation of the LCS is a frequent task in DNA sequence ana...
Costas S. Iliopoulos, M. Sohel Rahman
COMGEO
2011
ACM
13 years 5 months ago
Improved bounds for cops-and-robber pursuit
We prove that n cops can capture (that is, some cop can get less than unit distance from) a robber in a continuous square region with side length less than √ 5n and hence that n/...
Laurent Alonso, Edward M. Reingold
SODA
2008
ACM
110views Algorithms» more  SODA 2008»
13 years 11 months ago
Why simple hash functions work: exploiting the entropy in a data stream
Hashing is fundamental to many algorithms and data structures widely used in practice. For theoretical analysis of hashing, there have been two main approaches. First, one can ass...
Michael Mitzenmacher, Salil P. Vadhan
BIOID
2008
119views Biometrics» more  BIOID 2008»
13 years 12 months ago
Some Unusual Experiments with PCA-Based Palmprint and Face Recognition
Abstract. In this paper we describe a number of experiments relating to PCAbased palmprint and face recognition. The experiments were designed to determine the influence of differe...
Ivan Krevatin, Slobodan Ribaric