Sciweavers

9176 search results - page 138 / 1836
» algorithms 2010
Sort
View
104
Voted
CORR
2010
Springer
155views Education» more  CORR 2010»
15 years 4 months ago
Combinatorial Approximation Algorithms for MaxCut using Random Walks
: We give the first combinatorial approximation algorithm for MAXCUT that beats the trivial 0.5 factor by a constant. The main partitioning procedure is very intuitive, natural, an...
Satyen Kale, C. Seshadhri
LREC
2010
165views Education» more  LREC 2010»
15 years 6 months ago
Maximum Entropy Classifier Ensembling using Genetic Algorithm for NER in Bengali
In this paper, we propose classifier ensemble selection for Named Entity Recognition (NER) as a single objective optimization problem. Thereafter, we develop a method based on gen...
Asif Ekbal, Sriparna Saha
CATA
2010
15 years 4 months ago
A Hardware Implementation of the Advanced Encryption Standard (AES) Algorithm using SystemVerilog
In this paper, a hardware implementation of the AES128 encryption algorithm is proposed. A unique feature of the proposed pipelined design is that the round keys, which are consum...
Bahram Hakhamaneshi, Behnam S. Arad
ALGORITHMICA
2010
147views more  ALGORITHMICA 2010»
15 years 4 months ago
Note on the Structure of Kruskal's Algorithm
We study the merging process when Kruskal's algorithm is run with random graphs as inputs. Our aim is to analyze this process when the underlying graph is the complete graph ...
Nicolas Broutin, Luc Devroye, Erin McLeish
140
Voted
APIN
2010
172views more  APIN 2010»
15 years 4 months ago
Detecting interest cache poisoning in sensor networks using an artificial immune algorithm
The objective of this paper is to investigate how a Danger Theory based Artificial Immune System--in particular the Dendritic Cell Algorithm (DCA) can detect an attack on a sensor ...
Christian Wallenta, Jungwon Kim, Peter J. Bentley,...