Search

Showing total 255 results
255 results

Search Results

101. Efficient hardware architecture based on generalized Hebbian algorithm for texture classification

102. An extended one-versus-rest support vector machine for multi-label classification

103. Multi-scale gist feature manifold for building recognition

104. Kernel machine-based rank-lifting regularized discriminant analysis method for face recognition

105. Optimal algorithms for online scheduling on parallel machines to minimize the makespan with a periodic availability constraint

106. A clustering method combining differential evolution with the K-means algorithm

107. Towards timed fuzzy Petri net algorithms for chemical abnormality monitoring

108. Scalable local density-based distributed clustering

109. Dynamic hierarchical triangulation of a clustered data stream

110. Fault containment in weakly stabilizing systems

111. On the road to the weakest failure detector for -set agreement in message-passing systems

112. Computing large matchings in planar graphs with fixed minimum degree

113. Effective utility mining with the measure of average utility

114. High-dimensional objective optimizer: An evolutionary algorithm and its nonlinear analysis

115. An improved algorithm for support vector clustering based on maximum entropy principle and kernel matrix

116. ASAP: Eliminating algorithm-based disclosure in privacy-preserving data publishing

117. Particle swarm optimization with selective particle regeneration for data clustering

118. An incremental mining algorithm for maintaining sequential patterns using pre-large sequences

119. A novel Artificial Immune System for fault behavior detection

120. Differential evolution and quantum-inquired differential evolution for evolving Takagi–Sugeno fuzzy models

121. The surviving rate of an outerplanar graph for the firefighter problem

122. Text stream clustering algorithm based on adaptive feature selection

123. A generalized greedy routing algorithm for 2-connected graphs

124. The approximate swap and mismatch edit distance

125. Dynamic programming based algorithms for set multicover and multiset multicover problems

126. Optimization for first order Delaunay triangulations

127. Static and dynamic routing and wavelength assignment algorithms for future transport networks

128. Bounded sequence testing from deterministic finite state machines

129. Equal-area locus-based convex polygon decomposition

130. Coarse-to-fine stereo vision with accurate 3D boundaries

131. SIFT, SURF & seasons: Appearance-based long-term localization in outdoor environments

132. Minimizing the makespan on a single parallel batching machine

133. Boosting with pairwise constraints

134. Classifying materials in the real world

135. On the longest common parameterized subsequence

136. Claw finding algorithms using quantum walk

137. Online scheduling of unit length jobs on a batching machine to maximize the number of early jobs with lookahead

138. A randomized algorithm for determining dominating sets in graphs of maximum degree five

139. Distance paired-domination problems on subclasses of chordal graphs

140. Hardness results and approximation algorithms for (weighted) paired-domination in graphs

141. An optimal and processor efficient parallel sorting algorithm on a linear array with a reconfigurable pipelined bus system

142. Hybrid GMDH-type modeling for nonlinear systems: Synergism to intelligent identification

143. On the intersection of regex languages with regular languages

144. Consistency of the QNet algorithm for generating planar split networks from weighted quartets

145. A sliding window method for finding top-k path traversal patterns over streaming Web click-sequences

146. Efficient algorithms to compute compressed longest common substrings and compressed palindromes

147. Algorithms for connected set cover problem and fault-tolerant connected set cover problem

148. RCELF: A residual-based approach for Influence Maximization Problem.

149. Structural Presburger digit vector automata

150. Towards mechanized correctness proofs for cryptographic algorithms: Axiomatization of a probabilistic Hoare style logic