Sciweavers

ESA
2010
Springer
203views Algorithms» more  ESA 2010»
14 years 21 days ago
A Complete Characterization of Group-Strategyproof Mechanisms of Cost-Sharing
Abstract. We study the problem of designing group-strategyproof costsharing mechanisms. The players report their bids for getting serviced and the mechanism decides a set of player...
Emmanouil Pountourakis, Angelina Vidali
ESA
2010
Springer
203views Algorithms» more  ESA 2010»
14 years 21 days ago
Testing Euclidean Spanners
In this paper we develop a property testing algorithm for the problem of testing whether a directed geometric graph with bounded (out)degree is a (1 + )-spanner.
Frank Hellweg, Melanie Schmidt, Christian Sohler
DIALM
2010
ACM
146views Algorithms» more  DIALM 2010»
14 years 21 days ago
Regional consecutive leader election in mobile ad-hoc networks
In this paper we introduce the regional consecutive leader election (RCLE) problem, which extends the classic leader election problem to the ever-changing environment of mobile ad-...
Hyun Chul Chung, Peter Robinson, Jennifer L. Welch
DIALM
2010
ACM
138views Algorithms» more  DIALM 2010»
14 years 21 days ago
Data transmission and base-station placement for optimizing network lifetime
Esther M. Arkin, Valentin Polishchuk, Alon Efrat, ...
COCO
2010
Springer
168views Algorithms» more  COCO 2010»
14 years 22 days ago
A New Sampling Protocol and Applications to Basing Cryptographic Primitives on the Hardness of NP
We investigate the question of what languages can be decided efficiently with the help of a recursive collisionfinding oracle. Such an oracle can be used to break collisionresistan...
Iftach Haitner, Mohammad Mahmoody, David Xiao
CEC
2010
IEEE
14 years 22 days ago
Two novel Ant Colony Optimization approaches for Bayesian network structure learning
Learning Bayesian networks from data is an N-P hard problem with important practical applications. Several researchers have designed algorithms to overcome the computational comple...
Yanghui Wu, John A. W. McCall, David W. Corne
CEC
2010
IEEE
14 years 22 days ago
Iterated local search vs. hyper-heuristics: Towards general-purpose search algorithms
An important challenge within hyper-heuristic research is to design search methodologies that work well, not only across different instances of the same problem, but also across di...
Edmund K. Burke, Timothy Curtois, Matthew R. Hyde,...
APPROX
2010
Springer
136views Algorithms» more  APPROX 2010»
14 years 22 days ago
Vertex Sparsifiers: New Results from Old Techniques
Matthias Englert, Anupam Gupta, Robert Krauthgamer...
ASIAN
2009
Springer
274views Algorithms» more  ASIAN 2009»
14 years 22 days ago
Reducing Equational Theories for the Decision of Static Equivalence
Abstract. Static equivalence is a well established notion of indistinguishability of sequences of terms which is useful in the symbolic analysis of cryptographic protocols. Static ...
Steve Kremer, Antoine Mercier 0002, Ralf Treinen
ASIAN
2009
Springer
308views Algorithms» more  ASIAN 2009»
14 years 22 days ago
Automated Security Proof for Symmetric Encryption Modes
Abstract. We presents a compositional Hoare logic for proving semantic security of modes of operation for symmetric key block ciphers. We propose a simple programming language to s...
Martin Gagné, Pascal Lafourcade, Yassine La...