Sciweavers

SPIRE
2009
Springer
13 years 11 months ago
A Linear-Time Burrows-Wheeler Transform Using Induced Sorting
To compute Burrows-Wheeler Transform (BWT), one usually builds a suffix array (SA) first, and then obtains BWT using SA, which requires much redundant working space. In previous ...
Daisuke Okanohara, Kunihiko Sadakane
SPIRE
2009
Springer
13 years 11 months ago
Indexing Variable Length Substrings for Exact and Approximate Matching
We introduce two new index structures based on the q-gram index. The new structures index substrings of variable length instead of q-grams of fixed length. For both of the new ind...
Gonzalo Navarro, Leena Salmela
SPIRE
2009
Springer
13 years 11 months ago
Directly Addressable Variable-Length Codes
We introduce a symbol reordering technique that implicitly synchronizes variable-length codes, such that it is possible to directly access the i-th codeword without need of any sam...
Nieves R. Brisaboa, Susana Ladra, Gonzalo Navarro
SPIRE
2009
Springer
13 years 11 months ago
k2-Trees for Compact Web Graph Representation
The directed graph representation of the World Wide Web has been extensively used to analyze the Web structure, behavior and evolution. However, those graphs are huge and do not ...
Nieves R. Brisaboa, Susana Ladra, Gonzalo Navarro
RSKT
2009
Springer
13 years 11 months ago
Self-adapting Cyclic Delay Diversity System
—Cyclic Delay Diversity (CDD) is a simple and efficient space-time diversity technique. It can be used in OFDM and DFT-Spread-OFDM. The traditional CDD has low complexity and sys...
Aoyang Zheng, Yafeng Wang, Dacheng Yang, Wei Xiang
RSKT
2009
Springer
13 years 11 months ago
Mechanisms of Partial Supervision in Rough Clustering Approaches
We bring two rough-set-based clustering algorithms into the framework of partially supervised clustering. A mechanism of partial supervision relying on either qualitative or quanti...
Rafael Falcón, Gwanggil Jeon, Kangjun Lee, ...
RSKT
2009
Springer
13 years 11 months ago
A Prototype Biometric Security Authentication System Based upon Fingerprint Recognition
Abstract. In this paper, we have proposed a prototype biometrics authentication system based upon fingerprint recognition. The major functional blocks of the proposed authenticati...
Wei Xiang, Bhavin Desai, Paul Wen, Yafeng Wang, Ti...
RSKT
2009
Springer
13 years 11 months ago
Learning Optimal Parameters in Decision-Theoretic Rough Sets
A game-theoretic approach for learning optimal parameter values for probabilistic rough set regions is presented. The parameters can be used to define approximation regions in a p...
Joseph P. Herbert, Jingtao Yao
RSKT
2009
Springer
13 years 11 months ago
Estimation of Mutual Information: A Survey
A common problem found in statistics, signal processing, data analysis and image processing research is the estimation of mutual information,
Janett Walters-Williams, Yan Li
RSKT
2009
Springer
13 years 11 months ago
EEG Analysis on Skull Conductivity Perturbations Using Realistic Head Model
Measurement of electroencephalogram (EEG) requires accurate estimation of tissue conductivity. Among the head tissues, skull compartment has less conductivity due to compacta and s...
Md. Rezaul Bashar, Yan Li, Peng Wen