Skip to main content
    • by 
    •   20  
      BioinformaticsArtificial IntelligenceSocial NetworksMachine Learning
This paper presents an experimental comparison of a number of different algorithms for computing the Deluanay triangulation. The algorithms examined are: Dwyer's divide and conquer algorithm, Fortune's sweepline algorithm, several... more
    • by 
    •   8  
      Computational GeometryPure MathematicsNumerical Analysis and Computational MathematicsDelaunay Triangulation
    • by 
    •   8  
      Supervised LearningSpecification TestsLazy LearningInput Output
If it is true that good problems produce good science, then it will be worthwhile to identify good problems, and even more worthwhile to discover the attributes that make them good problems. This discovery process is necessarily... more
    • by 
    •   15  
      Artificial IntelligenceCommunicationErgonomicsGesture
and algorithms to calculate it. The reported machine vision applications are nearest-neighbor interpolation, pattern
    • by 
    •   8  
      Cognitive ScienceDistanceParallel AlgorithmEuclidean Geometry
    • by 
    •   7  
      Information SystemsComputer SciencePetri NetsPetri Net
    • by 
    •   3  
      System IntegrationSystem EngineeringDivide and Conquer
Page 1. Deterministic Algorithms for 3-D Diameter and some 2-D Lower Envelopes * Edgar A. Ramos t Abstract We present a deterministic algorithm for computing the diameter of a set of n points in R3; its run-ning time O(n log n) is... more
    • by 
    •   5  
      AlgorithmsImplementationExperimentationRandomized Algorithm
    • by 
    •   11  
      Computer ScienceJava ProgrammingOpen SourcePatterns
Formal verification is easy to use and provides significant increases in productivity and quality when used on RTL designs, which fit formal verification tool capacity. However, formal verification can be challenging when used on designs... more
    • by 
    •   3  
      Model CheckingFormal VerificationDivide and Conquer
The efficiency of the core Galois field arithmetic improves the performance of elliptic curve based public key cryptosystem implementation. This paper describes the design and implementation of a reconfigurable Galois field multiplier,... more
    • by 
    •   9  
      Network SecurityTime DelayHardware Implementation of AlgorithmsElliptic Curve Cryptography
When we search from a huge amount of documents, we often specify several keywords and use conjunctive queries to narrow the result of the search. Though the searched documents contain all keywords, positions of the keywords are usually... more
    • by 
    •   6  
      Information RetrievalData MiningHTMLWeb Pages
Parallel algorithms for solving geometric problems on two array processor models-the mesh-connected computer (MCC) and a two-dimensional systolic array-are presented. We illustrate a recursive divide-and-conquer paradigm for MCC... more
    • by 
    •   13  
      Applied MathematicsComputer ScienceParallel AlgorithmsComputer Hardware
    • by 
    •   8  
      PsychologyCognitive ScienceCognitionAttention
R…SUM…. Il est connu que les performances des algorithmes d'extraction des itemsets fermØs laissent ‡ dØsirer lorsqu'ils sont appliquØs sur des contextes Øparses. Aussi, dans ce papier, nous proposons une approche qui... more
    • by  and +1
    •   5  
      Data MiningFrequent Itemset MiningHybrid ApproachAssociation Rule
This paper extends the algorithms which were developed in Part I to cases in which there is no a ne schedule, i.e. to problems whose parallel complexity is polynomial but not linear. The natural generalization is to multidimensional... more
    • by 
    •   12  
      Computer ArchitectureDistributed ComputingParallel ProgrammingScheduling
a) User sketches (b) Automatic segmentation (c) Polycube map (d) GPU subdivision displacement Figure 1: The proposed method allows the users to easily edit and control the polycube map by sketching the features/constraints on the 3D model... more
    • by 
    •   8  
      Real-time renderingDigital GeometrySurface parameterizationHigh Resolution
    • by 
    •   7  
      EngineeringMathematical SciencesAnalysis of AlgorithmsLower Bound
The goal of approximating metric spaces by more simple metric spaces has led to the notion ofgraph spanners [PU89, PS891 and to low-distortion embeddings in low-dimensional spaces [LLR94], having many algorithmic applications. This paper... more
    • by 
    •   15  
      MathematicsComputer ScienceRandomized AlgorithmsDistributed Computing
This paper extends the algorithms which were developed in Part I to cases in which there is no a ne schedule, i.e. to problems whose parallel complexity is polynomial but not linear. The natural generalization is to multidimensional... more
    • by 
    •   10  
      Distributed ComputingParallel ProgrammingSchedulingComputer Software
The LCS problem is to determine the longest common subsequence (LCS) of two strings. A new linear-space algorithm to solve the LCS problem is presented. The only other algorithm with linear-space complexity is by Hirschberg and has... more
    • by 
    •   3  
      Computer SoftwareDivide and ConquerData Format
We present a new algorithm, called marching cubes, that creates triangle models of constant density surfaces from 3D medical data. Using a divide-and-conquer approach to generate inter-slice connectivity, we create a case table that... more
    • by 
    •   16  
      Computer ScienceComputer GraphicsImage ProcessingMedical Imaging
This paper describes a new parallel sorting algorithm, derived from the odd-even mergesort algorithm, named "partition and concurrent merging" (PCM). The proposed algorithm is based on a divideand-conquer strategy. First, the data... more
    • by  and +1
    •   4  
      Parallel ComputingComputational ComplexitySorting AlgorithmDivide and Conquer
Hill Cipher is one of the symmetric key cryptographic algorithms that has several advantages in data encryption. To avoid key invertible matrices, key matrices are generated using Newton's binomial coefficients. Hill Cipher is one of the... more
    • by 
    •   7  
      ComplexityEncryptionMatrixDecryption
We review the three well-known fast algorithms for the solution of Yule-Walker (YW) equations: the Levinson, Euclidean, and Berlekamp-Massey algorithms, and show the relation between each of them and the Pad6 approximation problem. This... more
    • by 
    •   9  
      Signal ProcessingApproximation AlgorithmsDigital Signal ProcessingMultidisciplinary
Dynamic programming approach is an optimization approach that can solve the complex problem by dividing into overlapping sub-problems and solve those sub-problems stage by stage to get the optimal solution of the problem. Even though we... more
    • by 
    •   3  
      Dynamic programmingOptimizationDivide and Conquer
We present a framework for multi-core implementations of divide and conquer algorithms and show its efficiency and ease of use by applying it to the fundamental geo- metric problem of computing the convex hull of a point set. We... more
    • by 
    •   6  
      MathematicsComputer ScienceAlgorithmEase of Use
    • by 
    •   5  
      Computer HardwareCase StudyTest GenerationElectrical And Electronic Engineering
Non-parametric option pricing models, such as artificial neural networks, are often found to outperform their parametric counterparts in empirical option pricing exercises. In this context, non-parametric models are viewed as more... more
    • by 
    •   11  
      MathematicsApplied MathematicsFuzzy LogicNon-parametric methods
In this study, a cluster-computing environment is employed as a computational platform. In order to increase the efficiency of the system, a dynamic task scheduling algorithm is proposed, which balances the load among the nodes of the... more
    • by 
    •   16  
      Computer ScienceGrid ComputingComputational ModelingComputer Networks
Learning a large number of simple local concepts is both faster and easier than learning a single global concept. Inspired by this principle of divide and conquer, a number of modular learning approaches have been proposed by the... more
    • by 
    •   11  
      Computational IntelligenceLearning problemsCase StudyMixture of Experts
Description: This seminar course introduces students to the theory and practice of grand strategy, understood as a great design or idea that orders and guides what a state does in interactions with the other actors, whether states or... more
    • by 
    •   14  
      GeopoliticsHegemonyStalin and StalinismBritish appeasement policy
History indicates that the security community commonly takes a divide-and-conquer approach to battling malware threats: identify the essential and inalienable components of an attack, then develop detection and prevention techniques that... more
    • by 
    •   7  
      PolymorphismNatural languageSecure CommunicationBuffer Overflow
    • by 
    •   16  
      Computer ScienceComputer GraphicsImage ProcessingMedical Imaging
We present a de novo hierarchical simulation framework for first-principles based predictive simulations of materials and their validation on high-end parallel supercomputers and geographically distributed clusters. In this framework,... more
    • by 
    •   23  
      Distributed ComputingGrid ComputingParallel ComputingHigh Performance Computing Applications development for Atmosphere modeling
Procedures to divide a cake among n people with n-1 cuts (the minimum number) are analyzed and compared. For 2 persons, cut-and-choose, while envy-free and efficient, limits the cutter to exactly 50% if he or she is ignorant of the... more
    • by 
    •   7  
      Applied MathematicsMechanism DesignConflict ResolutionSiam
Drawing on Merritt's divide-and-conquer sorting taxonomy [1], we model comparison-based sorting as an abstract class with a template method to perform the sort by relegating the splitting and joining of arrays to its concrete subclasses.... more
    • by 
    •   10  
      Computer ScienceModelingObject Oriented DesignLevels of Abstraction
In this study, an innovative and intelligent computing regression algorithm, multivariate adaptive regression splines (MARS), was applied to simulate pesticide transport in soils. Using a divide-and-conquer method, the algorithm... more
    • by  and +1
    •   10  
      Biomedical EngineeringBiosystems engineeringPotential EvapotranspirationSoil Temperature
    • by 
    •   33  
      MathematicsAlgorithmsArtificial IntelligenceInformation Theory
This paper investigates the classification of multiclass motor imagery for electroencephalogram (EEG)-based Brain-Computer Interface (BCI) using the Filter Bank Common Spatial Pattern (FBCSP) algorithm. The FBCSP algorithm classifies EEG... more
    • by 
    •   20  
      AlgorithmsElectroencephalographyBrain Computer InterfaceImagination
We propose a stable and efficient divide-and-conquer algorithm for computing the eigendecomposition of a symmetric tri-block-diagonal matrix. The matrix can be derived from discretizing Laplace operator eigenvalue in some two-dimensional... more
    • by 
    •   9  
      Applied MathematicsComplexity TheoryFast multipole methodEigenvalues
    • by 
    •   5  
      Parallel ProcessingOPERATING SYSTEMParallel AlgorithmParallel Machines
    • by 
    •   5  
      Graph TheoryImage segmentationEdge DetectionMinimum Spanning Tree
We prwcnt two new algorithms, ADT and MDT, for solving order-n Toeplik systema of linear equations Tz-b in time O(n log'n) and space O(n). The fastest algorithma previously known, wch as Trench's algorithm, require time Q(n2) and require... more
    • by 
    •   11  
      AlgorithmsDegenerationPower SeriesToeplitz matrix
The goal of the PRISM project is the development of infrastructure and algorithms for the parallel solution of eigenvalue problems. We are currently investigating a complete eigensolver based on the Invariant Subspace Decomposition... more
    • by 
    •   5  
      Distributed Shared Memory SystemEigenvaluesMatrix MultiplicationReciprocally Symmetric Matrices
    • by 
    •   19  
      BiochemistryBioinformaticsDevelopmental BiologyClimate Change
When applied to a system, the doctrine of successive refinement is a divide-and-conquer strategy. Complex systems are sucessively divided into pieces that are less complex, until they are simple enough to be conquered. This decomposition... more
    • by 
    •   8  
      Computational ComplexitySystem ManagementComplex SystemSystem Engineering
The computation of the spectral decomposition of a symmetric arrowhead matrix is an important problem in applied mathematics . It is also the kernel of divide and conquer algorithms for computing the Schur decomposition of symmetric... more
    • by 
    •   5  
      Computational EfficiencyEigenvaluesSpectral DecompositionEigenvectors
One of the most important objectives in company logistics is the optimization of goods distribution considering the whole value chain. There are many algorithms to optimise the capacitated vehicle routing problems (CVRP) associated to... more
    • by  and +1
    •   3  
      Monte Carlo SimulationProcedia - Social and Behavioral ScienceDivide and Conquer
Due to wide application of evapotranspiration (ET) data, a number of indirect methods for estimation of reference ET (ETo) have been developed. Therefore, it becomes impractical for many users to select the best ETo estimation method for... more
    • by 
    •   20  
      Earth SciencesComputer ScienceClimate variabilityEvaporation