Sciweavers

WFLP
2009
Springer
277views Algorithms» more  WFLP 2009»
14 years 6 months ago
Termination of Context-Sensitive Rewriting with Built-In Numbers and Collection Data Structures
Context-sensitive rewriting is a restriction of rewriting that can be used to elegantly model declarative specification and programming languages such as Maude. Furthermore, it ca...
Stephan Falke, Deepak Kapur
WFLP
2009
Springer
244views Algorithms» more  WFLP 2009»
14 years 6 months ago
Type Checking and Inference Are Equivalent in Lambda Calculi with Existential Types
This paper shows that type-checking and type-inference problems are equivalent in domain-free lambda calculi with existential types, that is, type-checking problem is Turing reduci...
Yuki Kato, Koji Nakazawa
WDAG
2009
Springer
147views Algorithms» more  WDAG 2009»
14 years 6 months ago
Compact Routing in Power-Law Graphs
Abstract. We adapt the compact routing scheme by Thorup and Zwick to optimize it for power-law graphs. We analyze our adapted routing scheme based on the theory of unweighted rando...
Wei Chen, Christian Sommer 0002, Shang-Hua Teng, Y...
WDAG
2009
Springer
195views Algorithms» more  WDAG 2009»
14 years 6 months ago
A Local 2-Approximation Algorithm for the Vertex Cover Problem
We present a distributed 2-approximation algorithm for the minimum vertex cover problem. The algorithm is deterministic, and it runs in (∆ + 1)2 synchronous communication rounds,...
Matti Åstrand, Patrik Floréen, Valent...
WDAG
2009
Springer
187views Algorithms» more  WDAG 2009»
14 years 6 months ago
The Abstract MAC Layer
Fabian Kuhn, Nancy A. Lynch, Calvin C. Newport
WDAG
2009
Springer
117views Algorithms» more  WDAG 2009»
14 years 6 months ago
Elastic Transactions
This paper presents elastic transactions, a variant of the transactional model. Upon conflict detection, an elastic transaction might drop what it did so far within a separate tra...
Pascal Felber, Vincent Gramoli, Rachid Guerraoui
WDAG
2009
Springer
103views Algorithms» more  WDAG 2009»
14 years 6 months ago
Distributed Discovery of Large Near-Cliques
Given an undirected graph and 0 ≤ ≤ 1, a set of nodes is called -near clique if all but an fraction of the pairs of nodes in the set have a link between them. In this paper we...
Zvika Brakerski, Boaz Patt-Shamir
WDAG
2009
Springer
146views Algorithms» more  WDAG 2009»
14 years 6 months ago
Dynamics in Network Interaction Games
We study the convergence times of dynamics in games involving graphical relationships of players. Our model of local interaction games generalizes a variety of recently studied ga...
Martin Hoefer, Siddharth Suri
WDAG
2009
Springer
130views Algorithms» more  WDAG 2009»
14 years 6 months ago
Contention-Sensitive Data Structures and Algorithms
A contention-sensitive data structure is a concurrent data structure in which the overhead introduced by locking is eliminated in the common cases, when there is no contention, or ...
Gadi Taubenfeld