Sciweavers

12265 search results - page 168 / 2453
» Knuth-Morris-Pratt Algorithm: An Analysis
Sort
View
JMLR
2010
198views more  JMLR 2010»
14 years 5 months ago
Online Anomaly Detection under Adversarial Impact
Security analysis of learning algorithms is gaining increasing importance, especially since they have become target of deliberate obstruction in certain applications. Some securit...
Marius Kloft, Pavel Laskov
ICDAR
2005
IEEE
15 years 3 months ago
A Binarization Algorithm specialized on Document Images and Photos
In this paper, a new method for document images or photos binarization is presented. The method is simple, fast and robust and appropriate for normal as well as for special cases ...
Ergina Kavallieratou
92
Voted
PPOPP
1999
ACM
15 years 2 months ago
Automatic Parallelization of Divide and Conquer Algorithms
Divide and conquer algorithms are a good match for modern parallel machines: they tend to have large amounts of inherent parallelism and they work well with caches and deep memory...
Radu Rugina, Martin C. Rinard
APLAS
2009
ACM
15 years 4 months ago
Large Spurious Cycle in Global Static Analyses and Its Algorithmic Mitigation
We present a simple algorithmic extension of the classical call-strings approach to mitigate substantial performance degradation caused by spurious interprocedural cycles. Spuriou...
Hakjoo Oh
GECCO
2005
Springer
288views Optimization» more  GECCO 2005»
15 years 3 months ago
A comparison study between genetic algorithms and bayesian optimize algorithms by novel indices
Genetic Algorithms (GAs) are a search and optimization technique based on the mechanism of evolution. Recently, another sort of population-based optimization method called Estimat...
Naoki Mori, Masayuki Takeda, Keinosuke Matsumoto