Sciweavers

ESA
2008
Springer
126views Algorithms» more  ESA 2008»
13 years 11 months ago
Space-Time Tradeoffs for Proximity Searching in Doubling Spaces
Abstract. We consider approximate nearest neighbor searching in metric spaces of constant doubling dimension. More formally, we are given a set S of n points and an error bound &g...
Sunil Arya, David M. Mount, Antoine Vigneron, Jian...
ESA
2008
Springer
112views Algorithms» more  ESA 2008»
13 years 11 months ago
Time-Dependent SHARC-Routing
In recent years, many speed-up techniques for Dijkstra's algorithm have been developed that make the computation of shortest paths in static road networks a matter of microse...
Daniel Delling
ESA
2008
Springer
99views Algorithms» more  ESA 2008»
13 years 11 months ago
Robust Kinetic Convex Hulls in 3D
Abstract. Kinetic data structures provide a framework for computing combinatorial properties of continuously moving objects. Although kinetic data structures for many problems have...
Umut A. Acar, Guy E. Blelloch, Kanat Tangwongsan, ...
ICANNGA
2007
Springer
153views Algorithms» more  ICANNGA 2007»
13 years 11 months ago
A Neural Framework for Robot Motor Learning Based on Memory Consolidation
Neural networks are a popular technique for learning the adaptive control of non-linear plants. When applied to the complex control of android robots, however, they suffer from se...
Heni Ben Amor, Shuhei Ikemoto, Takashi Minato, Ber...
ICANNGA
2007
Springer
134views Algorithms» more  ICANNGA 2007»
13 years 11 months ago
Optical Design with Epsilon-Dominated Multi-objective Evolutionary Algorithm
Significant improvement over a patented lens design is achieved using multi-objective evolutionary optimization. A comparison of the results obtained from NSGA2 and ε-MOEA is done...
Shaine Joseph, Hyung W. Kang, Uday K. Chakraborty
ECAI
2008
Springer
13 years 11 months ago
Learning to Select Object Recognition Methods for Autonomous Mobile Robots
Selecting which algorithms should be used by a mobile robot computer vision system is a decision that is usually made a priori by the system developer, based on past experience and...
Reinaldo A. C. Bianchi, Arnau Ramisa, Ramon L&oacu...
DIALM
2008
ACM
140views Algorithms» more  DIALM 2008»
13 years 11 months ago
Latency of opportunistic forwarding in finite regular wireless networks
In opportunistic forwarding, a node randomly relays packets to one of its neighbors based on local information, without the knowledge of global topology. Each intermediate node co...
Prithwish Basu, Chi-Kin Chau
DIALM
2008
ACM
168views Algorithms» more  DIALM 2008»
13 years 11 months ago
Local broadcasting in the physical interference model
In this work we analyze the complexity of local broadcasting in the physical interference model. We present two distributed randomized algorithms: one that assumes that each node ...
Olga Goussevskaia, Thomas Moscibroda, Roger Watten...
DIALM
2008
ACM
135views Algorithms» more  DIALM 2008»
13 years 11 months ago
Symmetric range assignment with disjoint MST constraints
If V is a set of n points in the unit square [0, 1]2 , and if R : V + is an assignment of positive real numbers (radii) to to those points, define a graph G(R) as follows: {v, w}...
Eric Schmutz
DIALM
2008
ACM
96views Algorithms» more  DIALM 2008»
13 years 11 months ago
Modelling gateway placement in wireless networks: geometric k-centres of unit disc graphs
Stephane Durocher, Krishnam Raju Jampani, Anna Lub...