enter search term and/or author name below:
The exact online string matching problem: A review of the most recent results
Simone Faro, Thierry Lecroq
Article No.: 13
This article addresses the online exact string matching problem which consists in finding all occurrences of a given pattern p in a text t. It is an extensively studied problem in computer science, mainly due to its...
A systematic approach to classify design-time global scheduling techniques
Angeliki Kritikakou, Francky Catthoor, Vasilios Kelefouras, Costas Goutis
Article No.: 14
The scheduling problem is an important partially solved topic related to a wide range of scientific fields. As it applies to design-time mapping on multiprocessing platforms emphasizing on ordering in time and assignment in place, significant...
Polygon mesh repairing: An application perspective
Marco Attene, Marcel Campen, Leif Kobbelt
Article No.: 15
Nowadays, digital 3D models are in widespread and ubiquitous use, and each specific application dealing with 3D geometry has its own quality requirements that restrict the class of acceptable and supported models. This article analyzes typical...
A survey of cost-sensitive decision tree induction algorithms
Susan Lomax, Sunil Vadera
Article No.: 16
The past decade has seen a significant interest on the problem of inducing decision trees that take account of costs of misclassification and costs of acquiring the features used for decision making. This survey identifies over 50 algorithms...
Virtualization: Issues, security threats, and solutions
Michael Pearce, Sherali Zeadally, Ray Hunt
Article No.: 17
Although system virtualization is not a new paradigm, the way in which it is used in modern system architectures provides a powerful platform for system building, the advantages of which have only been realized in recent years, as a result of the...
Bidirectional associative memories: Different approaches
Maria Elena Acevedo-Mosqueda, Cornelio Yáñez-Márquez, Marco Antonio Acevedo-Mosqueda
Article No.: 18
Bidirectional Associative Memories (BAM) are systems that allow to associate pairs of patterns. Once a memory has learned, patterns can be recalled in two directions. BAMs have many applications in pattern recognition and image processing. The aim...
Sequential pattern mining -- approaches and algorithms
Carl H. Mooney, John F. Roddick
Article No.: 19
Sequences of events, items, or tokens occurring in an ordered metric space appear often in data and the requirement to detect and analyze frequent subsequences is a common problem. Sequential Pattern Mining arose as a subfield of data mining to...
P2P group management systems: A conceptual analysis
Timo Koskela, Otso Kassinen, Erkki Harjula, Mika Ylianttila
Article No.: 20
Peer-to-Peer (P2P) networks are becoming eminent platforms for both distributed computing and interpersonal communication. Their role in contemporary multimedia content delivery and communication systems is strong, as witnessed by many popular...
Synthesis and optimization of reversible circuits—a survey
Mehdi Saeedi, Igor L. Markov
Article No.: 21
Reversible logic circuits have been historically motivated by theoretical research in low-power electronics as well as practical improvement of bit manipulation transforms in cryptography and computer graphics. Recently, reversible circuits have...
Recognizing people by their ear has recently received significant attention in the literature. Several reasons account for this trend: first, ear recognition does not suffer from some problems associated with other non-contact biometrics, such as...
Offline arabic handwritten text recognition: A Survey
Mohammad Tanvir Parvez, Sabri A. Mahmoud
Article No.: 23
Research in offline Arabic handwriting recognition has increased considerably in the past few years. This is evident from the numerous research results published recently in major journals and conferences in the area of handwriting recognition....
A local algorithm is a distributed algorithm that runs in constant time, independently of the size of the network. Being highly scalable and fault tolerant, such algorithms are ideal in the operation of large-scale distributed systems....