Skip to main content
ÐEfficient and effective buffering of disk blocks in main memory is critical for better file system performance due to a wide speed gap between main memory and hard disks. In such a buffering system, one of the most important design... more
    • by 
    •   13  
      HistoryDistributed ComputingComputer HardwareDatabases
In this paper, we introduce a new threshold signature RSA-typed scheme. The proposed scheme has the characteristics of un-forgeable and robustness in random oracle model. Also, signature generation and verification is entirely... more
    • by 
    •   3  
      Time ComplexityRandom Oracle ModelThreshold Signature
Abstract— Time Slot Interchange and Signal Separator (TSISS) network was introduced to reduce the time slot requirement of TST architecture. In the switching algorithm of the TSISS network, an ad-jacency matrix was formed and Breath-first... more
    • by 
    •   6  
      Time ComplexityDistance metricAdjacency MatrixInput Output
We analyse the key algorithms of data and information fusion from a linguistic point of view, and show that they fall into two paradigms: the primarily syntactic, and the primarily semantic. We propose an alternative grammatical paradigm... more
    • by 
    •   16  
      Computer ScienceCombinatory Categorial GrammarParsingSituation Assessment
This work addresses the problem of low power design in high-level synthesis in the scenario of the resources operating at multiple voltages. The problem of resource-and-latency constrained scheduling is tackled and a novel methodology for... more
    • by 
    •   21  
      Computational ComplexityLinear ProgrammingInteger ProgrammingScheduling
Let S be a set of elements. We say that a collection C of subsets of S has the consecutive ones property if there exist a linear order on S and a 0-1 matrix M , where M ij = 1 if and only if the jth element is in the ith set in C, such... more
    • by 
    •   6  
      EngineeringDesign and Analysis of AlgorithmsMathematical SciencesLinear Order
Periodicity mining is used for predicting trends in time series data. Discovering the rate at which the time series is periodic has always been an obstacle for fully automated periodicity mining. Existing periodicity mining algorithms... more
    • by 
    •   20  
      Data MiningMeteorologyData AnalysisTime Series
Recently there has been a great deal of interest in performance evalution of parallel simulation. Most work is devoted to the time complexity and assumes that the amount of memory available for parallel simulation is unlimited. This paper... more
    • by 
    •   9  
      Information SystemsComputer ScienceMemory ManagementTime Complexity
In Image Compression, the researchers' aim is to reduce the number of bits required to represent an image by removing the spatial and spectral redundancies. Recently discrete wavelet transform and wavelet packet has emerged as popular... more
    • by 
    •   10  
      Pattern RecognitionImage compressionWavelet TransformTime Complexity
Inherent to the wireless sensor networks are the two major problems of the broadcasting vulnerability, the limited computational capability and power budget. Even though security is a must in most applications, current sophisticated... more
    • by 
    •   14  
      Network SecurityWireless securityEnergy ConsumptionWireless Network
In this work, the performance of probabilistic algebraic attacks is compared to classical (fast) algebraic attacks in the context of their application to certain linear beedback shift register (LFSR)-based stream ciphers. Using some... more
    • by 
    •   7  
      Coding TheoryTime ComplexityPerformance ComparisonElectrical And Electronic Engineering
Exploiting residual supports (or residues) has proved to be one of the most cost-effective ap- proaches for Maintaining Arc Consistency during search (MAC). While MAC based on optimal AC algorithm may have better theoretical time... more
    • by  and +1
    •   7  
      Data StructureCost effectivenessTheoretical AnalysisTime Complexity
We present an efficient Hough transform for automatic detection of cylinders in point clouds. As cylinders are one of the most frequently used primitives for industrial design, automatic and robust methods for their detection and fitting... more
    • by 
    •   11  
      Industrial DesignMultiple Instance LearningReverse EngineeringObject Recognition
We present a new machine learning method that, given a set of training examples, induces a definition of the target concept in terms of a hierarchy of intermediate concepts and their definitions. This effectively decomposes the problem... more
    • by 
    •   11  
      Cognitive ScienceArtificial IntelligenceMachine LearningLearning problems
Betweenness centrality measure is often used in social and computer communication networks to estimate the potential monitoring and control capabilities a vertex may have on data flowing in the network. In this paper we define the Routing... more
    • by 
    •   13  
      Communication NetworksNetwork monitoringCentralityTime Complexity
The time complexity for testing whether an n-by-n real matrix is a P-matrix is reduced from O(2n n 3) to O(2 n ) by applying recursively a criterion for P-matrices based on Schur complementation. A Matlab program implementing the... more
    • by 
    •   5  
      Applied MathematicsSchur complementTime ComplexityBIT
We study the problem of sequencing n jobs on a three-stage¯owshop with multiple identical machines at each stage (a¯exiblē owshop). The objective is to minimize the makespan. Since the problem is strongly NP-complete, we develop and... more
    • by 
    •   4  
      EngineeringMathematical SciencesTime ComplexityLower Bound
In field of Computer Science and Mathematics, sorting algorithm is an algorithm that puts elements of a list in a certain order i.e. ascending or descending. Sorting is perhaps the most widely studied problem in computer science and is... more
    • by 
    •   9  
      Computer ScienceComputational ComplexityAlgorithm AnalysisData Structure
Efficient ray shooting algorithm is inherently required by many computer graphics algorithms, particularly in image synthesis. Practical ray shooting algorithms aiming at the average-case complexity use some underlying spatial data... more
    • by 
    •   5  
      Time ComplexityComputer GraphicKd TreeImage Synthesis
AbstractÐEfficient and effective buffering of disk blocks in main memory is critical for better file system performance due to a wide speed gap between main memory and hard disks. In such a buffering system, one of the most important... more
    • by  and +1
    •   6  
      Distributed ComputingComputer HardwareComputer SoftwareTime Complexity
Using doubly linked list in embedded systems can be expensive. Although doubly linked is efficient in terms of time complexity and highly flexible in itself, enabling easy traversal and update, but it often demands more memory space... more
    • by 
    •   3  
      AlgorithmTime ComplexityLinked Lists
A general algorithm for computing Euclidean skeletons of 2D and 3D data sets in linear time is presented. These skeletons are defined in terms of a new concept, called the integer medial axis (IMA) transform. We prove a number of... more
    • by  and +1
    •   20  
      Information SystemsAlgorithmsArtificial IntelligenceLinear models
Functionality of electronic commerce enabling technologies is dependent upon pervasive networks that a large number of applications share. Given the scarcity of network resources, it is imperative to allocate existing resources based on... more
    • by 
    •   12  
      Information SystemsComputer ScienceIntelligent AgentsIntelligent Agent
The LTL Model Checking problem is reducible to finding accepting cycles in a graph. The Nested Depth-First Search (Ndfs) algorithm detects accepting cycles efficiently: on-the-fly, with linear-time complexity and negligible memory... more
    • by  and +1
    •   4  
      Model CheckingTime ComplexityLinear TimeDetection Algorithm
Abstract—There are many classical algorithms for finding routing in FPGA. But Using DNA computing we can solve the routes efficiently and fast. The run time complexity of DNA algorithms is much less than other classical algorithms which... more
    • by 
    •   5  
      RoutingDNA computingSearch AlgorithmTime Complexity
... 7 Conclusions In this paper, we have proposed a geometry-based image representation scheme and an algo-rithm/function for retrieving i&D images of relevance (based on spatial similarity) to ... The algorithm is robust-in the sense... more
    • by 
    •   18  
      Computer ScienceInformation RetrievalGraph TheoryInterior Design
This paper presents a new highly parallel algorithm for computing the minimumnorm (T) least-squares (S) solution of inconsistent linear equations Ax ¼ bðA 2 R mÂn r ; b 6 2 RðAÞÞ. By this algorithm the solution x ¼ A þ S;T b is obtained... more
    • by  and +1
    •   8  
      Applied MathematicsTime ComplexityParallel ComputationParallel Algorithm
Bubble-sort graphs are variants of Cayley graphs. A bubble-sort graph is suitable as a topology for massively parallel systems because of its simple and regular structure. Therefore, in this study, we focus on n-bubble-sort graphs and... more
    • by 
    •   11  
      Information SystemsLawInformation TheoryAlgorithm
    • by 
    •   8  
      Parallel AlgorithmsResource AllocationCluster ComputingTime Complexity
Workstations and personal computers are increasingly being used for applications with real-time characteristics such as speech understanding and synthesis, media computations and I/O, and animation, often concurrently executed with... more
    • by 
    •   15  
      Operating SystemsMultimediaSchedulingAlgorithm
There is growing interest in scaling up the widely-used decision-tree learning algorithms to very large data sets. Although numerous diverse techniques have been proposed, a fast tree-growing algorithm without substantial decrease in... more
    • by 
    •   7  
      Text ClassificationScaling upTime ComplexityNaive Bayes
Finding the shortest paths in a schedule-based public transit network is similar to finding the shortest paths in a network with multi-costs constrained and time-window constraints. We consider a schedulebased transit network, where each... more
    • by 
    •   5  
      Applied MathematicsTime ComplexityNumerical Analysis and Computational MathematicsPath finding
We are given an integer n and a real-valued function w(i, j) defined for integers 0 5 i <j 5 n and with the property that w(i,-,, j,,) + w(il, jl) I w(iO, jl) + w( il, J,-J for 0 5 i, < il < j,, < j, I n. The concave least-weight... more
    • by 
    •   5  
      AlgorithmsOptimizationAlgorithmicsTime Complexity
Quite a few recent models are rapidly introducing new concepts describing different levels of consciousness. This situation is getting confusing because some theorists formulate their models without making reference to existing views,... more
    • by 
    •   19  
      PsychologyCognitive SciencePhilosophyPerception
The non-blocking work-stealing algorithm of Arora, Blumofe, and Plaxton (henceforth ABP work-stealing) is on its way to becoming the multiprocessor load balancing technology of choice in both industry and academia. This highly efficient... more
    • by 
    •   5  
      Computer ScienceLoad BalancingTime ComplexityLoad Balance
    • by 
    •   8  
      Data Structures and AlgorithmsData StructureTime ComplexityRandom permutation generation
Comparing gene orders in completely sequenced genomes is a standard approach to locate clusters of functionally associated genes. Often, gene orders are modeled as permutations. Given k permutations of n elements, a k-tuple of intervals... more
    • by 
    •   2  
      Gene OrderTime Complexity
A lower bound of Omega(n 2 log(n)) is proved for the time complexity of calculating the inverse of a matrix nxn, over the real or complex numbers in the sequential computation case.
    • by 
    •   4  
      Computational ComplexityMatrix InversionTime ComplexityLower Bound
We construct an exact algorithm for the Hamiltonian cycle problem in planar graphs with worst case time complexity O(c √ n ), where c is some fixed constant that does not depend on the instance. Furthermore, we show that under the... more
    • by 
    •   6  
      Applied MathematicsCombinatorial OptimizationBusiness and ManagementTime Complexity
The effectiveness of an algorithm is measured from the amount of time and space required by the algorithm. The objective of this study was to measure the time complexity of the ANFIS algorithm. The time complexity is calcultaed by... more
    • by 
    •   4  
      ANFISTime ComplexityRunning timeAsymptotic Notation
Finding clusters in data, especially high dimensional data, is challenging when the clusters are of widely differing shapes, sizes, and densities, and when the data contains noise and outliers. We present a novel clustering technique that... more
    • by 
    •   10  
      Time SeriesNearest NeighborCluster AnalysisHigh Dimensional Data
Let G (V, E) be a simple graph and k be a ®xed positive integer. A vertex w is said to be a kneighbourhood-cover of an edge (u, v) if d(u, w) k and d(v, w) k. A set C V is called a kneighbourhood-covering set if every edge in E is... more
    • by  and +1
    •   17  
      MathematicsApplied MathematicsComputer ScienceDesign
The increasing sophistication of computer technology with its capacity to collect, analyze and disseminate information on individuals posses a great challenge to society today. The Collection of information about users has become a... more
    • by 
    •   37  
      Artificial IntelligenceMachine LearningData MiningWireless Communications
Software testing is a dual purpose process that reveals defects and is used to evaluate quality attributes of the software, such as, reliability, security, usability, and correctness. The critical problem in software testing is time... more
    • by 
    •   12  
      Computer ScienceQuantum ComputingInformation TechnologySoftware Testing
The Hough transform provides a robust technique for skew detection in document images, but suffers from high time complexity which becomes prohibitive for detecting skew in large documents. Analysis of time complexity on various stages of... more
    • by 
    •   8  
      Image ProcessingPattern RecognitionDocument AnalysisTime Complexity
Sorting is the basic operation in most of the applications of computer science. Sorting means to arrange data in particular order inside computer. In this paper we have discussed performance of different sorting algorithms with their... more
    • by 
    •   5  
      Information TechnologyComputer EngineeringSorting AlgorithmsTime Complexity
Sugiyama's algorithm for layered graph drawing is very popular and commonly used in practical software. The extensive use of dummy vertices to break long edges between non-adjacent layers often leads to unsatisfying performance. The... more
    • by 
    •   4  
      Applied MathematicsGraph DrawingAlgorithms - Graph theory & applicationsTime Complexity
This paper presents a novel evolutionary optimization strategy based on the derandomized evolution strategy with covariance matrix adaptation (CMA-ES). This new approach is intended to reduce the number of generations required for... more
    • by 
    •   21  
      AlgorithmsEvolutionary ComputationComputational BiologyComputational Science
Sorting is the basic operation in most of the applications of computer science. Sorting means to arrange data in particular order inside computer. In this paper we have discussed performance of different sorting algorithms with their... more
    • by 
    •   5  
      Information TechnologyComputer EngineeringSorting AlgorithmsTime Complexity
Previous survey research revealed that consumers perceived online shopping and buying to be a time saving practice. Para- doxically, they only rarely reported using that tactic to save time, introducing a contradiction. Focus group... more
    • by 
    •   5  
      Survey ResearchAppliedFocus GroupTime Complexity