Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,966,373 papers from all fields of science
Search
Sign In
Create Free Account
Greedy embedding
In distributed computing and geometric graph theory, greedy embedding is a process of assigning coordinates to the nodes of a telecommunications…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
16 relations
Cactus graph
Distributed computing
Fáry's theorem
Geographic routing
Expand
Broader (1)
Geometric graph theory
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
2 The strategy of the proofs of Theorem 1
Atsuhiro Nakamoto
,
Takayuki Nozawa
,
K. Ozeki
2016
Corpus ID: 51948395
For a positive integer k, a book (with k pages) is a topological space consisting of a spine, which is a line, and k pages, which…
Expand
2014
2014
A Dynamic Embedding Algorithm for Wireless Network Virtualization
Jonathan van de Belt
,
H. Ahmadi
,
L. Doyle
IEEE Vehicular Technology Conference
2014
Corpus ID: 6632183
Wireless network virtualization enables multiple virtual wireless networks to coexist on shared physical infrastructure. However…
Expand
2013
2013
A Novel Data Hiding Using Multi-Bit Minimum Error Replacement with Flexible Bit Location
Rong-Jian Chen
,
Jui-Lin Lai
,
Po-Hsian Huang
2013
Corpus ID: 61330959
The k-LSBs multi-bit minimum error replacement (MER) is a method used for embedding multi-bit logo/secret data into k least…
Expand
2013
2013
Greedy Embedding, Routing and Content Addressing for Darknets
Andreas Höfer
,
Stefanie Roos
,
T. Strufe
Conference on Networked Systems
2013
Corpus ID: 30878445
To achieve anonymous and censorship-resistant overlay communication, darknets restrict overlay links to trusted parties…
Expand
2013
2013
Single failure resiliency in greedy routing
Sahel Sahhaf
,
W. Tavernier
,
D. Colle
,
M. Pickavet
,
P. Demeester
International Workshop on the Design of Reliable…
2013
Corpus ID: 18536716
Using greedy routing, network nodes forward packets towards neighbors which are closer to their destination. This approach makes…
Expand
2012
2012
Aggregation-based discovery for virtual network environments
Heli Amarasinghe
,
A. Belbekkouche
,
A. Karmouch
IEEE International Conference on Communications…
2012
Corpus ID: 31821690
Resource discovery aims to assist the Virtual Network Provider (VNP) in selecting the best Infrastructure Provider (InP) which…
Expand
2012
2012
Low-stretch greedy embedding heuristics
Andrej Cvetkovski
,
M. Crovella
Proceedings IEEE INFOCOM Workshops
2012
Corpus ID: 1862961
Greedy embedding is a graph embedding that makes the simple greedy packet forwarding scheme successful for every source…
Expand
2009
2009
Greedy Convex Embeddings for Sensor Networks
Y. Berchenko
,
M. Teicher
International Conference on Parallel and…
2009
Corpus ID: 7632177
Recent advances in systems of networked sensors have set the stage for smart environments which will have wide-ranging…
Expand
2006
2006
Greedy Embeddings , Trees , and Euclidean vs . Lobachevsky Geometry
P. Maymounkov
2006
Corpus ID: 18322242
A greedy embedding of an unweighted undirected graph G = (V, E) into a metric space (X, ρ) is a function f : V → X such that for…
Expand
2004
2004
Quantitative steganalysis of binary images
Ming Jiang
,
N. Memon
,
E. Wong
,
Xiaolin Wu
International Conference on Image Processing…
2004
Corpus ID: 15784053
We propose a quantitative steganalysis method to detect hidden information embedded by flipping pixels along boundaries in binary…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE