Sciweavers

1566 search results - page 168 / 314
» Contification Using Dominators
Sort
View
WAOA
2004
Springer
127views Algorithms» more  WAOA 2004»
15 years 3 months ago
Better Bounds for Minimizing SONET ADMs
SONET add-drop multiplexers (ADMs) are the dominant cost factor in SONET /WDM rings. The number of SONET ADMs required by a set of traffic streams is determined by the routing and...
Leah Epstein, Asaf Levin
SPIRE
2001
Springer
15 years 2 months ago
Speeding-up Hirschberg and Hunt-Szymanski LCS Algorithms
Two algorithms are presented that solve the problem of recovering the longest common subsequence of two strings. The £rst algorithm is an improvement of Hirschberg’s divide-andc...
Maxime Crochemore, Costas S. Iliopoulos, Yoan J. P...
SSIAI
2000
IEEE
15 years 2 months ago
Modulation Domain Image Segmentation
We present a modulation domain technique for segmenting textured images modeled as 2-D multicomponent AMFM functions. A Gabor filterbank is used to derive estimates of the domina...
Tanachit Tangsukson, Joseph P. Havlicek
CIKM
2008
Springer
15 years 3 days ago
Passage relevance models for genomics search
We present a passage relevance model for integrating syntactic and semantic evidence of biomedical concepts and topics using a probabilistic graphical model. Component models of t...
Jay Urbain, Ophir Frieder, Nazli Goharian
IJDE
2007
105views more  IJDE 2007»
14 years 10 months ago
Mobile Phone Forensics Tool Testing: A Database Driven Approach
The Daubert process used in the admissibility of evidence contains major guidelines applied in assessing forensic procedures, two of which are testing and error rates. The Digital...
Ibrahim M. Baggili, Richard Mislan, Marcus Rogers