Sciweavers

CPM
2009
Springer
131views Combinatorics» more  CPM 2009»
15 years 8 months ago
Linear Time Suffix Array Construction Using D-Critical Substrings
In this paper we present in detail a new efficient linear time and space suffix array construction algorithm(SACA), called the D-CriticalSubstring algorithm. The algorithm is built...
Ge Nong, Sen Zhang, Wai Hong Chan
LION
2010
Springer
197views Optimization» more  LION 2010»
15 years 8 months ago
Adapting to a Realistic Decision Maker: Experiments towards a Reactive Multi-objective Optimizer
The interactive decision making (IDM) methods exploit the preference information from the decision maker during the optimization task to guide the search towards favourite solution...
Paolo Campigotto, Andrea Passerini
KDD
2010
ACM
275views Data Mining» more  KDD 2010»
15 years 8 months ago
Combined regression and ranking
Many real-world data mining tasks require the achievement of two distinct goals when applied to unseen data: first, to induce an accurate preference ranking, and second to give g...
D. Sculley
KDD
2010
ACM
245views Data Mining» more  KDD 2010»
15 years 8 months ago
Flexible constrained spectral clustering
Constrained clustering has been well-studied for algorithms like K-means and hierarchical agglomerative clustering. However, how to encode constraints into spectral clustering rem...
Xiang Wang, Ian Davidson
COLCOM
2009
IEEE
15 years 8 months ago
VaaS: Videoconference as a service
- Internet is a place nowadays where interoperating services are offered which can be integrated or mashed up in order to fulfill user demands. This paper proposes a way to offer v...
Pedro Rodriguez, Daniel Gallego, Javier Cervino, F...