Sciweavers

2767 search results - page 264 / 554
» Universal Exponentiation Algorithm
Sort
View
128
Voted
CORR
2010
Springer
161views Education» more  CORR 2010»
15 years 3 months ago
Database Reverse Engineering based on Association Rule Mining
Maintaining a legacy database is a difficult task especially when system documentation is poor written or even missing. Database reverse engineering is an attempt to recover high-...
Nattapon Pannurat, Nittaya Kerdprasop, Kittisak Ke...
CORR
2008
Springer
158views Education» more  CORR 2008»
15 years 3 months ago
Improved Smoothed Analysis of the k-Means Method
The k-means method is a widely used clustering algorithm. One of its distinguished features is its speed in practice. Its worst-case running-time, however, is exponential, leaving...
Bodo Manthey, Heiko Röglin
CORR
2008
Springer
104views Education» more  CORR 2008»
15 years 3 months ago
De Bruijn Graph Homomorphisms and Recursive De Bruijn Sequences
This paper presents a method to find new De Bruijn cycles based on ones of lesser order. This is done by mapping a De Bruijn cycle to several vertex disjoint cycles in a De Bruijn ...
Abbas Alhakim, Mufutau Akinwande
JAIR
2008
99views more  JAIR 2008»
15 years 3 months ago
The Complexity of Planning Problems With Simple Causal Graphs
We present three new complexity results for classes of planning problems with simple causal graphs. First, we describe a polynomial-time algorithm that uses macros to generate pla...
Omer Giménez, Anders Jonsson
IOR
2006
75views more  IOR 2006»
15 years 3 months ago
Sensitivity of Performance in the Erlang-A Queueing Model to Changes in the Model Parameters
This paper studies the M/M/s+M queue, i.e., the M/M/s queue with customer abandonment, also called the Erlang-A model, having independent and identically distributed customer aban...
Ward Whitt