Bibliografie

Detailansicht

Frontiers in Algorithmics

Third International Workshop, FAW 2009, Hefei, China, June 20-23,2009, Proceedings, Lecture Notes in Computer Science 5598 - Theoretical Computer Science and General Issues
ISBN/EAN: 9783642022692
Umbreit-Nr.: 4378835

Sprache: Englisch
Umfang: xiv, 372 S.
Format in cm:
Einband: kartoniertes Buch

Erschienen am 08.06.2009
Auflage: 1/2009
€ 53,49
(inklusive MwSt.)
Lieferbar innerhalb 1 - 2 Wochen
  • Zusatztext
    • This book constitutes the refereed proceedings of the Third International Frontiers of Algorithmics Workshop, FAW 2009, held in Hefei, Anhui, China, in June 2009. The 33 revised full papers presented together with the abstracts of 3 invited talks were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections on graph algorithms; game theory with applications; graph theory, computational geometry; machine learning; parameterized algorithms, heuristics and analysis; approximation algorithms; as well as pattern recognition algorithms, large scale data mining.

  • Kurztext
    • This book constitutes the refereed proceedings of the Third International Frontiers of Algorithmics Workshop, FAW 2009, held in Hefei, Anhui, China, in June 2009. The 33 revised full papers presented together with the abstracts of 3 invited talks were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections on graph algorithms; game theory with applications; graph theory, computational geometry; machine learning; parameterized algorithms, heuristics and analysis; approximation algorithms; as well as pattern recognition algorithms, large scale data mining.

  • Autorenportrait
    • InhaltsangabeFAW 2009.- Study on Parallel Computing.- Communication Complexity and Its Applications.- Algorithmic Problems in Computer and Network Power Management.- Shortest Path and Maximum Flow Problems in Networks with Additive Losses and Gains.- Edge Search Number of Cographs in Linear Time.- Formal Derivation of a High-Trustworthy Generic Algorithmic Program for Solving a Class of Path Problems.- Improved Algorithms for Detecting Negative Cost Cycles in Undirected Graphs.- Covering-Based Routing Algorithms for Cyclic Content-Based P/S System.- On the ?-Sensitivity of Nash Equilibria in PageRank-Based Network Reputation Games.- Cop-Robber Guarding Game with Cycle Robber Region.- Covered Interest Arbitrage in Exchange Rate Forecasting Markets.- CFI Construction and Balanced Graphs.- Minimizing the Weighted Directed Hausdorff Distance between Colored Point Sets under Translations and Rigid Motions.- Space-Query-Time Tradeoff for Computing the Visibility Polygon.- Square and Rectangle Covering with Outliers.- Processing an Offline Insertion-Query Sequence with Applications.- Bounds on the Geometric Mean of Arc Lengths for Bounded-Degree Planar Graphs.- On Minimizing One Dimension of Some Two-Dimensional Geometric Representations of Plane Graphs.- On Modulo Linked Graphs.- Pathwidth is NP-Hard for Weighted Trees.- A Max-Margin Learning Algorithm with Additional Features.- DDoS Attack Detection Algorithm Using IP Address Features.- Learning with Sequential Minimal Transductive Support Vector Machine.- Junction Tree Factored Particle Inference Algorithm for Multi-Agent Dynamic Influence Diagrams.- An Efficient Fixed-Parameter Enumeration Algorithm for Weighted Edge Dominating Set.- Heuristics for Mobile Object Tracking Problem in Wireless Sensor Networks.- Efficient Algorithms for the Closest String and Distinguishing String Selection Problems.- The BDD-Based Dynamic A* Algorithm for Real-Time Replanning.- Approximating Scheduling Machines with Capacity Constraints.- Approximating the Spanning k-Tree Forest Problem.- Toward an Automatic Approach to Greedy Algorithms.- A Novel Approximate Algorithm for Admission Control.- On the Structure of Consistent Partitions of Substring Set of a Word.- A Bit-Parallel Exact String Matching Algorithm for Small Alphabet.- An Improved Database Classification Algorithm for Multi-database Mining.- Six-Card Secure AND and Four-Card Secure XOR.
Lädt …