Sciweavers

FAW
2009
Springer
177views Algorithms» more  FAW 2009»
14 years 6 months ago
Bounds on the Geometric Mean of Arc Lengths for Bounded-Degree Planar Graphs
Data access time becomes the main bottleneck in applications dealing with large-scale graphs. Cache-oblivious layouts, constructed to minimize the geometric mean of arc lengths of ...
Mohammad Khairul Hasan, Sung-Eui Yoon, Kyung-Yong ...
FAW
2009
Springer
180views Algorithms» more  FAW 2009»
14 years 6 months ago
Edge Search Number of Cographs in Linear Time
We give a linear-time algorithm for computing the edge search number of cographs, thereby proving that this problem can be solved in polynomial time on this graph class. With our ...
Pinar Heggernes, Rodica Mihai
FAW
2009
Springer
178views Algorithms» more  FAW 2009»
14 years 6 months ago
Improved Algorithms for Detecting Negative Cost Cycles in Undirected Graphs
Xiaofeng Gu, Kamesh Madduri, K. Subramani, Hong-Ji...
FAW
2009
Springer
134views Algorithms» more  FAW 2009»
14 years 6 months ago
Pathwidth is NP-Hard for Weighted Trees
The pathwidth of a graph G is the minimum clique number of H minus one, over all interval supergraphs H of G. We prove in this paper that the PATHWIDTH problem is NP-hard for parti...
Rodica Mihai, Ioan Todinca
ESA
2009
Springer
131views Algorithms» more  ESA 2009»
14 years 6 months ago
Solving Dominating Set in Larger Classes of Graphs: FPT Algorithms and Polynomial Kernels
Abstract. We show that the k-Dominating Set problem is fixed parameter tractable (FPT) and has a polynomial kernel for any class of
Geevarghese Philip, Venkatesh Raman, Somnath Sikda...
ESA
2009
Springer
346views Algorithms» more  ESA 2009»
14 years 6 months ago
Hash, Displace, and Compress
A hash function h, i.e., a function from the set U of all keys to the range range [m] = {0, . . . , m − 1} is called a perfect hash function (PHF) for a subset S ⊆ U of size n ...
Djamal Belazzougui, Fabiano C. Botelho, Martin Die...
ESA
2009
Springer
98views Algorithms» more  ESA 2009»
14 years 6 months ago
The Oil Searching Problem
Given n potential oil locations, where each has oil at a certain depth, we seek good trade-offs between the number of oil sources found and the total amount of drilling performed. ...
Andrew McGregor, Krzysztof Onak, Rina Panigrahy
ESA
2009
Springer
127views Algorithms» more  ESA 2009»
14 years 6 months ago
Piercing Translates and Homothets of a Convex Body
According to a classical result of Gr¨unbaum, the transversal number τ(F) of any family F of pairwise-intersecting translates or homothets of a convex body C in Rd is bounded by...
Adrian Dumitrescu, Minghui Jiang
ESA
2009
Springer
111views Algorithms» more  ESA 2009»
14 years 6 months ago
Exact and Approximate Equilibria for Optimal Group Network Formation
We consider a process called Group Network Formation Game, which represents the scenario when strategic agents are building a network together. In our game, agents can have extrem...
Elliot Anshelevich, Bugra Caskurlu
ESA
2009
Springer
122views Algorithms» more  ESA 2009»
14 years 6 months ago
Bounded Budget Betweenness Centrality Game for Strategic Network Formations
In this paper, we introduce the bounded budget betweenness centrality game, a strategic network formation game in which nodes build connections subject to a budget constraint in or...
Xiaohui Bei, Wei Chen, Shang-Hua Teng, Jialin Zhan...