Sciweavers

STOC
1997
ACM
76views Algorithms» more  STOC 1997»
14 years 2 months ago
Exploring Unknown Environments
We consider exploration problems where a robot has to construct a complete map of an unknown environment. We assume that the environment is modeled by a directed, strongly connecte...
Susanne Albers, Monika Rauch Henzinger
STOC
1997
ACM
129views Algorithms» more  STOC 1997»
14 years 2 months ago
Better Bounds for Online Scheduling
We study a classical problem in online scheduling. A sequence of jobs must be scheduled on m identical parallel machines. As each job arrives, its processing time is known. The goa...
Susanne Albers
SPAA
1997
ACM
14 years 2 months ago
Pipelining with Futures
Pipelining has been used in the design of many PRAM algorithms to reduce their asymptotic running time. Paul, Vishkin, and Wagener (PVW) used the approach in a parallel implementat...
Guy E. Blelloch, Margaret Reid-Miller
SIGMOD
1997
ACM
146views Database» more  SIGMOD 1997»
14 years 2 months ago
Concurrency and Recovery in Generalized Search Trees
This paper presents general algorithms for concurrency control in tree-based access methods as well as a recovery protocol and a mechanism for ensuring repeatable read. The algori...
Marcel Kornacker, C. Mohan, Joseph M. Hellerstein
MM
1997
ACM
112views Multimedia» more  MM 1997»
14 years 2 months ago
An Evaluation of VBR Disk Admission Algorithms for Continuous Media File Servers
In this paper, we address the problem of choosing a disk admission algorithm for continuous media streams where each stream may have a di erent bit rate, and more importantly, whe...
Dwight J. Makaroff, Gerald W. Neufeld, Norman C. H...
ANTS
1998
Springer
93views Algorithms» more  ANTS 1998»
14 years 2 months ago
Evaluation of Linear Relations between Vectors of a Lattice in Euclidean Space
We prove that to find a nontrivial integer linear relation between vectors of a lattice L IRn , whose euclidean length is at most M, one needs O n5+ (ln Mn/)1+ binary operations f...
Igor A. Semaev
ANTS
1998
Springer
120views Algorithms» more  ANTS 1998»
14 years 2 months ago
The Complete Analysis of the Binary Euclidean Algorithm
Abstract. We provide here a complete average
Brigitte Vallée
DAC
1997
ACM
14 years 2 months ago
Safe BDD Minimization Using Don't Cares
In many computer-aided design tools, binary decision diagrams (BDDs) are used to represent Boolean functions. To increase the efficiency and capability of these tools, many algor...
Youpyo Hong, Peter A. Beerel, Jerry R. Burch, Kenn...
COMPGEOM
1997
ACM
14 years 2 months ago
Realistic Input Models for Geometric Algorithms
Many algorithms developed in computational geometry are needlessly complicated and slow because they have to be prepared for very complicated, hypothetical inputs. To avoid this, ...
Mark de Berg, Matthew J. Katz, A. Frank van der St...
WDAG
1998
Springer
71views Algorithms» more  WDAG 1998»
14 years 2 months ago
Efficient Deadlock-Free Multi-dimensional Interval Routing in Interconnection Networks
Rastislav Kralovic, Branislav Rovan, Peter Ruzicka...