Sciweavers

74 search results - page 12 / 15
» esas 2006
Sort
View
ESAS
2006
Springer
13 years 11 months ago
Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks
The appliance of wireless sensor networks to a broad variety of applications doubtlessly requires end-user acceptance. End-users from various computer network unrelated disciplines...
Frederik Armknecht, Joao Girão, Marc Stoeck...
ESA
2006
Springer
77views Algorithms» more  ESA 2006»
13 years 11 months ago
Negative Examples for Sequential Importance Sampling of Binary Contingency Tables
The sequential importance sampling (SIS) algorithm has gained considerable popularity for its empirical success. One of its noted applications is to the binary contingency tables p...
Ivona Bezáková, Alistair Sinclair, D...
ESA
2006
Springer
111views Algorithms» more  ESA 2006»
13 years 11 months ago
Kinetic Collision Detection for Convex Fat Objects
We design compact and responsive kinetic data structures for detecting collisions between n convex fat objects in 3-dimensional space that can have arbitrary sizes. Our main result...
Mohammad Ali Abam, Mark de Berg, Sheung-Hung Poon,...
ESA
2006
Springer
102views Algorithms» more  ESA 2006»
13 years 11 months ago
Necklaces, Convolutions, and X + Y
We give subquadratic algorithms that, given two necklaces each with n beads at arbitrary positions, compute the optimal rotation of the necklaces to best align the beads. Here ali...
David Bremner, Timothy M. Chan, Erik D. Demaine, J...
ESA
2006
Springer
77views Algorithms» more  ESA 2006»
13 years 11 months ago
Traversing the Machining Graph
Abstract. Zigzag pocket machining (or 2D-milling) plays an important role in the manufacturing industry. The objective is to minimize the number of tool retractions in the zigzag m...
Danny Z. Chen, Rudolf Fleischer, Jian Li, Haitao W...