Sciweavers

STOC
2004
ACM
74views Algorithms» more  STOC 2004»
14 years 11 months ago
On the performance of greedy algorithms in packet buffering
Susanne Albers, Markus Schmidt
RECOMB
2007
Springer
14 years 11 months ago
Selecting Genomes for Reconstruction of Ancestral Genomes
It is often impossible to sequence all descendent genomes to reconstruct an ancestral genome. In addition, more genomes do not necessarily give a higher accuracy for the reconstruc...
Guoliang Li, Jian Ma, Louxin Zhang
KDD
2007
ACM
192views Data Mining» more  KDD 2007»
14 years 12 months ago
Allowing Privacy Protection Algorithms to Jump Out of Local Optimums: An Ordered Greed Framework
Abstract. As more and more person-specific data like health information becomes available, increasing attention is paid to confidentiality and privacy protection. One proposed mode...
Rhonda Chaytor

Lecture Notes
443views
15 years 9 months ago
Design and Analysis of Computer Algorithms
"This course will consist of a number of major sections. The first will be a short review of some preliminary material, including asymptotics, summations, and recurrences and ...
David M. Mount

Book
2455views
15 years 9 months ago
Art of Programming Contest - C Programming Tutorials | Data Structures | Algorithms
"The objective of this edition is not only to assist the contestants during the contest hours but also describing the core subjects of Computer Science such as C Programming, ...
Ahmed Shamsul Arefin

Book
321views
15 years 9 months ago
Algorithms
"This book evolved over the past ten years from a set of lecture notes developed while teaching the undergraduate Algorithms course at Berkeley and U.C. San Diego. Our way of ...
S. Dasgupta, C.H. Papadimitriou, and U.V. Vazirani