A Comprehensive Review of Overlapping Community Detection Algorithms for Social Networks
|
|
- Holly Craig
- 6 years ago
- Views:
Transcription
1 International Journal of Engineering Researh and Appliations (IJERA) ISSN: National Conferene on Advanes in Engineering and Tehnology (AET- 29th Marh 2014) RESEARCH ARTICLE OPEN ACCESS A Comprehensive Revie of Overlapping Community Detetion Algorithms for Soial Netorks Ashish Kumar Singh 1, Sapna Gambhir 2 1 (YMCA University of Siene and Tehnology ashebdeveloper@gmail.om) 2 (YMCA University of Siene and Tehnology sapnagambhir@gmail.om) Abstrat Community struture is an interesting feature found in many soial netorks hih signifies that there is intense interation beteen some individuals. These ommunities have a tendeny to overlap ith eah other as there are nodes that an belong to multiple ommunities simultaneously. Detetion of suh overlapping ommunities is a hallenging task; it still remains a topi of interest for the researhers as it ansers many questions about the behavior of the netork and its operation as a funtion of its struture. This paper revies overlapping ommunity detetion tehniques proposed so far and points out their strengths and eaknesses. The paper also presents insightful harateristis and limitations of the existing state of art algorithms to solve the problem of overlapping ommunity detetion. Keyords Overlapping Community detetion, Online Soial Netorks, Complex Netorks, Community Struture. I. INTRODUCTION Online soial netorks have beome a primary means of ommuniation noadays; they attrat a ide variety of audiene. Nearly every person has a profile on Faebook, Google plus, Orkut, Titter et hih are olletively termed as Soial Netorking Sites (SNS). People usually ommuniate to others via these SNS and this ommuniation has attrated a lot of researh fous in reent years under the domain named Soial Netork Analysis. A soial netork is a graphial representation of the ommuniation among people, here people are represented as nodes and the edges beteen a pair of nodes represent some kind of ommuniation beteen them. A very interesting feature in soial netorks is the formation of Communities. A ommunity is a group of individuals in a soial netork ho ommuniate more frequently ith eah other than ith others outside the group. When a the soial netork is represented as a graph G (V, E), here V representing the individuals and E representing the onnetions among them, then a ommunity C G suh that the number of edges going outside from the verties in C is far less than the number of edges ith both verties inside C. The detetion of suh ommunities is not trivial and is quite hallenging as it is ompletely different from to similar and ell studied problems in omputer siene namely Clustering and Graph Partitioning. The first most hallenge in the domain of ommunity detetion is that there is no generally aepted definition of a ommunity; still there are a large number of ommunity detetion algorithms available hih produe effetive results. Most of the ommunity detetion algorithms do not take in to aount the overlapping beteen ommunities, hih is a serious ase in SNSs. Communities in soial netorks, tends to overlap ith eah other hih means that a vertex hih is a member of one ommunity an also be a member of another ommunity as shon in Fig 1. The idea of overlapping ommunities makes the problem of ommunity detetion tougher as the result of the algorithms ould no be a Cover, a set of ommunities of hih a vertex is a member. Most of the ommunity detetion algorithms start resulting in bad assignments of ommunities to verties in the overlapping ase as they generally merge to ommunities ith dense overlaps into a single ommunity. Fig 1: Illustration of overlapping ommunities, nodes shon in red olor 5 P a g e
2 International Journal of Engineering Researh and Appliations (IJERA) ISSN: National Conferene on Advanes in Engineering and Tehnology (AET- 29th Marh 2014) This paper presents a systemati and organized study of overlapping ommunity detetion tehniques. The strengths and eaknesses of eah tehnique is also a matter of fous in this paper. The major ontributions of this paper ill be: To serve as a base for those starting researh in this diretion. To provide them ith the existing state of art algorithms for the researh problem. To make them aare of the hallenges in the diretion and the solutions proposed so far. The paper is organized in to setions namely Problem Formulation hih learly states the problem of overlapping ommunity detetion, Tehniques hih explains the tehniques used so far to solve the problem and their orresponding strengths and eaknesses, and at last Conlusion hih sums up the ork onduted and the future diretions for ork. II. PROBLEM FORMULATION Given a graph G (V, E ), here V is the set of Verties and E is the set of edges assign to eah vertex v V a over C here C represents the set of ommunities of hih v is a member. V =n, E =m For dense graphs m= O (n 2 ) and for sparse graphs m=o (n). III. TECHNIQUES The algorithms for overlapping ommunity detetion an be broadly lassified into folloing ategories: a) Link Partitioning Algorithms b) Clique Based Algorithms ) Agent Based and Dynami Algorithms d) Fuzzy Algorithms e) Loal Expansion and Optimization Algorithms We ill explore eah of them one by one, and ill point out their relative strengths and eaknesses. a) Link Partitioning Algorithms The basi idea of link partitioning algorithms is to partition links to disover the ommunities. To steps of every link partitioning algorithms are: Step 1: Construt the Dendrogram. Step 2: Partition the Dendrogram at some threshold. A node ill be identified as overlapping if the links to the node are present in more than one luster. Links are partitioned by hierarhial lustering in [1] on the basis of edge similarity. If e are given a pair of links eik and e jk, the edge similarity beteen these to links is alulated by Jaard index as: S( jk, ik) i j i j e e N N N N N i is the set of nodes hih are in the neighborhood of node i inluding node i. After alulating edge similarities linkage lustering is done to find hierarhial ommunities. Generally single linkage hierarhial lustering is done beause of its simpliity and effiieny hih enables us to apply it on large netorks. Other lustering methods inlude average and omplete hierarhial lustering. Initially every node belongs to its on ommunity, and then links ith highest similarities are merged into a single ommunity, this proess is repeated until all the links belong to a single ommunity. This hole merging proess is stored in a Dendrogram hih reords the hierarhial ommunity organization. Fig 2: Illustration of a Dendrogram; y axis represents similarity (linkage distane) and x axis denotes node indies. This Dendrogram is then ut at a threshold value of partition density to reveal ommunities as shon in Fig 2. Partition density attains a global maximum at some level in the Dendrogram; it is average at the top of Dendrogram and attains the loest value at the leaves of the Dendrogram. The idea of link partitioning is quite natural and intuitive but it an t guarantee better results than node partitioning algorithms as it is also based on the ambiguous definition of ommunity [2]. The omplexity is O (nk 2 max), here k max is the maximum degree of any node in the netork. b) Clique Based Algorithms A lique is a maximal subgraph in hih all nodes are adjaent to eah other. The input to Clique based algorithms is a netork graph G and an integer k. Clique based algorithms have folloing steps in general: Step 1: Find all liques of size k in the given netork. Step 2: Construt a lique graph. Any to k-liques are adjaent if they share k-1 nodes. Step 3: Eah onneted omponents in the lique graph form a ommunity. CPM (Clique Perolation Method) is based on the assumption that a netork is omposed of liques hih overlap ith eah other. CPM finds overlapping 6 P a g e
3 International Journal of Engineering Researh and Appliations (IJERA) ISSN: National Conferene on Advanes in Engineering and Tehnology (AET- 29th Marh 2014) ommunities by searhing for adjaent liques. As a vertex an be a member of more than one lique, so overlap is possible beteen ommunities. The parameter k is of utmost importane in finding ommunities via CPM, Empirially small values of k have shon effetive results [3] [4]. An effiient implementation of the CPM method is CFinder. CPM is suitable for dense graphs here liques are present. In ase there are fe liques only CPM fails to produe meaningful overs. Example 1: shoing the orking of lique perolation as shon in Fig 3. Fig 3: A netork ith 6 k-liques here k=3 Clearly the netork has 6 liques of size 3, first of all these are identified by the CPM as {1, 2, 3}, {1,3,4}, {4,5,6}, {5,6,7}, {5,6,8}, {6,7,8}. After finding the liques, a lique graph is formed in hih to liques are adjaent if they share k-1 nodes as shon in Fig 4. Fig 4: shoing the lique graph for the netork in Fig 3 To ommunities ill be shon as result and they are: {1,2,3,4} and {4,5,6,7,8} The major disadvantage of CPM is that it fails to terminate for large netorks. Some argue that CPM is more like a pattern mathing algorithm as it searhes for a partiular pattern in the given netork on the basis of input parameter k. To other Clique based algorithms are CPM [5] and SCPM[6]. CPM is for eighted netorks, it introdues the onept of intensity threshold. Only the liques ith subgraph intensity greater than the threshold are inluded in the ommunity. CPM produes ommunities ith smoother ontours as ompared to CPM. SCPM is faster than CPM as it doesn t proess the netork for all values of k, instead it proesses only for a given value of k. SCPM suits for eighted netorks having hierarhial ommunity struture. ) Agent Based and Dynami Algorithms Three famous algorithms that ome under this ategory are SLPA [7], COPRA [8], and Label Propagation algorithm [9]. SLPA is Speaker-Listener label propagation algorithm, in hih a node is alled speaker if it is spreading information and is alled a listener if it is onsuming information. Labels are spread aording to pair ise interation rules. In SLPA a node an have many labels depending upon the underlying information it has learned from the netork. The time omplexity of SLPA is O(tm) here t is the number of iterations and m is number of edges. The best part of SLPA is that it doesn t require any prior knoledge about the number of ommunities in the netork. In other to algorithms the node forgets the information it has learned in previous iterations but in SLPA eah node has a stored memory in hih it stores all the information it has learned about the netork in form of labels. Whenever a node observes more labels in surrounding, it is more likely that it ill spread those labels to other nodes. The Label Propagation algorithm desribed in [9] is extended to overlapping ase by alloing a node to have multiple labels. Initially all nodes have their on unique label, labels are updated upon iterations depending upon the labels oupied by the maximum neighbors. Nodes ith same labels form a ommunity. LPA as modified by Gregory [8], he introdued Community Overlap Propagation Algorithm (COPRA). In COPRA eah label onsists of a belonging oeffiient and a ommunity identifier. The sum of belonging oeffiients of ommunities over all neighbors is normalized. A node updates its belonging oeffiient in a synhronous fashion by averaging the belonging oeffiients of all its neighbors at eah step. The parameter v ontrols the number of ommunities of hih a node an be a member. The time omplexity of COPRA is O (vmlog(vm/n)). Aording to benhmarks in [10] COPRA provides the best results for overlapping ommunities. An important optimization in LPA an be to avoid unneessary updates, hih ill redue the exeution time. d) Fuzzy Algorithms The overlap beteen ommunities an be of to types, one is the risp overlap in hih eah node either belongs to a ommunity or doesn t, the belonging fator is 1 for all the ommunities a node is a member. The other type of overlap is the fuzzy overlap in hih eah node an be a member of ommunities ith belonging fator in the range 0 to 1.The membership strength of a node to a ommunity is denoted by b n and if e sum the belonging oeffiients 7 P a g e
4 International Journal of Engineering Researh and Appliations (IJERA) ISSN: National Conferene on Advanes in Engineering and Tehnology (AET- 29th Marh 2014) of a vertex for all the ommunities of hih it is a member the result ill be 1. C b n =1 here C The major drabak of fuzzy based overlapping ommunity detetion methods is the need to alulate the dimensionality k of the membership vetor; this value is generally passed as a parameter to the algorithms, hile some algorithms alulate it from the data. Only a fe fuzzy methods have shon good results. In [10], authors proposed an algorithm ith the ombination of spetral lustering, fuzzy means and optimization of a quality funtion. They propose a method to detet up to k ommunities by using the fuzzy means lustering algorithm after onverting the input netork to a k- dimensional Eulidean spae. The auray and omputational effiieny of the algorithm is heavily dependent upon the parameter k. Nepsuz [11] model the problem of overlapping ommunity detetion as an optimization problem onstrained nonlinearly hih an be solved by simulated annealing methods. The objetive funtion required to be minimized in this method is: f n i 1 j 1 ij( xij x ij) n Where ij denotes a predefined eight and denotes prior similarity beteen nodes i and j. Similarity xij is defined as: x ij i j a a Where ai is the fuzzy membership of node i in ommunity, subjeted to onstraints of total membership and non empty ommunity. To determine the value of k, it is inreased repeatedly until the value of ommunity struture doesn t improve as measured by modified fuzzy modularity funtion, Q defined as: 1 kk i j Q [ Aij ]ai aj 2m 2m i, j A hybrid approah [18] based on Bayesian Non-negative Matrix Fatorization to ahieve soft partitioning of the netork in omputationally effetive manner is proposed. The advantage of this approah is that it doesn t suffer from the problem of resolution limit. This approah is a mix of dimensionality redution and feature extration in mahine learning. The problem ith NMF approah is that it is omputationally ineffiient beause of large matrix multipliations. e) Loal Expansion and Optimization Algorithms These algorithms rely on a loal benefit funtion hih enodes the quality of densely onneted subgraphs. The goal of these algorithms is to expand partial or natural ommunities so as to maximize the 2 x ij loal benefit funtion. The quality of disovered ommunities heavily depends upon the quality of seed ommunities. A lique serves as a better seed than a single node. EAGLE [12] reates a Dendrogram by using agglomerative frameork. First of all maximal liques are identified, and initialized as seed ommunities, then similarity values are omputed and ommunities ith maximum similarity are merged. The optimal ut of the Dendrogram is alulated using extended modularity funtion defined in [13]. EAGLE is omputationally expensive even ithout taking into aount the time required for finding maximal liques. GCE [14] also uses liques as seed ommunities and expands them using a loal fitness funtion. Communities are merged if they are found similar to previously deteted ommunities. The similarity is omputed using the distane funtion defined as: min( 1, 2 ) If the distane is smaller than the value speified by parameter then ommunities 1 and 2 are merged. The time omplexity of GCE is O (mh) here m is number of edges and h is the number of liques. In [15], author proposed another to step tehnique in hih nodes are first of all ranked aording to some riterion, and then highly ranked nodes are removed until small disjoint luster ores are formed. In the seond step i.e Iterative San (IS) these ores at as seed ommunities hih are expanded by adding or removing nodes until a loal density funtion annot be improved further. The density funtion used is given as: f () in in out in is total internal eight and out is the total external eight of ommunity. The orst ase omplexity of this tehnique is O(n 2 ). IS sometimes results in disonneted omponents as the algorithm allos removal of nodes during expansion, so CIS [16] as introdued in hih onnetedness is heked after eah iteration. OSLOM [17] orks by omparing the statistial signifiane of a luster ith the global null model (i.e. the random graph onfiguration model) during the expansion phase. To gro the ommunity r value is omputed for eah neighbor, hih is the umulative probability of having more internal edges in the ommunity than the number of edges from neighbors in the null model. If the umulative distribution of smallest r value is lesser than a tolerane value, the node is onsidered signifiant and is added to the ommunity otherise seond smallest r value is onsidered. The average time omplexity is O (n 2), it is dependent upon the underlying ommunity struture of the input netork. The main problem ith OSLOM is 8 P a g e
5 International Journal of Engineering Researh and Appliations (IJERA) ISSN: National Conferene on Advanes in Engineering and Tehnology (AET- 29th Marh 2014) that it results in signifiant number of singleton ommunities or outliers. To detet both stati and temporal ommunities ilcd [18] intrinsi longitudinal ommunity detetion as proposed hih updates ommunities by adding nodes depending upon hether the number of their first, seond robust neighbors is greater than an expeted value or not. The algorithm depends upon to parameters one for adding nodes to the ommunity and another for merging to ommunities. Reently there have been many improvements in the loal optimization and expansion algorithms. IV. CONCLUSION Overlapping ommunity detetion approahes have attrated a lot of attention of researhers in reent years and there is a onsiderable inrease in the number of algorithms published for solving the issue as it has appliations in various domains like mirobiology, soial siene and physis. Analyzing ommunity struture in soial netork has emerged as a topi of groing interest as it shos the interplay beteen the strutures of the netork and its funtioning. This paper tries to revie all popular algorithms for overlapping ommunity detetion ith their strengths and eaknesses. We have tried our best to revie all popular algorithms, but the study is by no means omplete as there are neer algorithms disovered at a fast rate beause of the groing interest of researhers in this domain. REFERENCES [1] Ahn, Y.-Y., Bagro, J. P., and S. Lehmann, Link ommunities reveal multisale omplexity in netorks, Nature -466, 2010, [2] S.Fortunato, Community detetion in graphs, Physis Report, 486(3), 2010, [3] Palla, G., Derenyi,Farkas, I., and Visek, T., Unovering the overlapping ommunity struture of omplex netorks in nature and soiety, Nature-435, 2005, [4] Lanihinetti, A., Fortunato, S., and Kertesz, J., Deteting the overlapping and hierarhial ommunity struture of omplex netorks, Ne Journal Physis, Cornell University, U.S.A., 11, 2009, [5] Farkas, I., Abel,D., Palla, G., and Visek, T. Weighted netork modules, Ne Journal Physis, Cornell University, U.S.A., 9(6), 2007, [6] Kumpula, J. M., Kivela Sequential algorithm for fast lique perolation. Physis Revie, Cornell University, U.S.A., 78( 2), 1-8. [7] Xie, J., Szymanski, B. K., and Liu, X., SLPA: Unovering overlapping ommunities in soial netorks via a speaker-listener interation dynami proess, Proeeding of ICDM Workshop, IEEE, 2011, [8] S.Gregory, Finding overlapping ommunities in netorks by label propagation, Ne Journal Physis, Cornell University, U.S.A., 12, 2010, [9] Raghavan, U. N., Albert, R., and Kumara, S., Near linear time algorithm to detet ommunity strutures in large-sale netorks. Physis Revie, Cornell University, U.S.A., 76, 2007, [10] Zhang S., Wang R.S., Zhang X.S, Identifiation of overlapping ommunity struture in omplex netorks using fuzzy -means lustering, Elsevier, 374(1),2007, [11] Nepusz Y., Petroz A., Negyessy L., and Bazso F,Fuzzy, Communities and the onept of bridgeness in omplex netorks, Physis Revie, Cornell University, 77, 2008, [12] Shen, H., Cheng, X., Cai, K., and Hu, M.-B. Detet overlapping and hierarhial ommunity struture, Physia A, 388, 2009, 1-7. [13] Shen, H., Cheng, X., and Guo, J., Quantifying and identifying the overlapping ommunity struture in netorks, J. Stat. Meh., 07, 2009, [14] Lee, C., Reid, F., MDaid, A., and Hurley, N., Deteting highly overlapping ommunity struture by greedy lique expansion, Proeeding of SNAKDD Workshop, 2010, [15] Baumes, J., Goldberg, M., Krishnamoorthy, M., Magdon-Ismail, M., and Preston, N., Finding ommunities by lustering a graph into overlapping subgraphs, Proeeding of IADIS, 5(1), 2005, [16] S.Kelley, The existene and disovery of overlapping ommunities in large-sale netorks, Ph.D. thesis, Rensselaer Polytehni Institute, Troy, NY, [17] Cazabet R., Amblard F., and Hanahi C, Detetion of overlapping ommunities in dynamial soial netorks, Proeedings of SOCIALCOM, 2010, [18] Psorakis I., Roberts S. and Ebden Mark, Overlapping ommunity detetion using Bayesian non-negative matrix fatorization, Physis Revie E, 83, 2011, P a g e
A Review on Overlapping Community Detection Algorithms
Review Paper A Review on Overlapping Community Detection Algorithms Authors 1 G.T.Prabavathi*, 2 Dr. V. Thiagarasu Address For correspondence: 1 Asst Professor in Computer Science, Gobi Arts & Science
More informationAn Edge-based Clustering Algorithm to Detect Social Circles in Ego Networks
JOURNAL OF COMPUTERS, VOL. 8, NO., OCTOBER 23 2575 An Edge-based Clustering Algorithm to Detet Soial Cirles in Ego Networks Yu Wang Shool of Computer Siene and Tehnology, Xidian University Xi an,77, China
More informationA Novel Validity Index for Determination of the Optimal Number of Clusters
IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers
More informationLearning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract
CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and
More informationSelf-Location of a Mobile Robot with uncertainty by cooperation of an heading sensor and a CCD TV camera
Self-oation of a Mobile Robot ith unertainty by ooperation of an heading sensor and a CCD TV amera E. Stella, G. Ciirelli, A. Distante Istituto Elaborazione Segnali ed Immagini - C.N.R. Via Amendola, 66/5-706
More informationExtracting Partition Statistics from Semistructured Data
Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk
More informationSLPA: Uncovering Overlapping Communities in Social Networks via A Speaker-listener Interaction Dynamic Process
SLPA: Uncovering Overlapping Cmunities in Social Networks via A Speaker-listener Interaction Dynamic Process Jierui Xie and Boleslaw K. Szymanski Department of Cputer Science Rensselaer Polytechnic Institute
More informationCluster-Based Cumulative Ensembles
Cluster-Based Cumulative Ensembles Hanan G. Ayad and Mohamed S. Kamel Pattern Analysis and Mahine Intelligene Lab, Eletrial and Computer Engineering, University of Waterloo, Waterloo, Ontario N2L 3G1,
More informationApproximate logic synthesis for error tolerant applications
Approximate logi synthesis for error tolerant appliations Doohul Shin and Sandeep K. Gupta Eletrial Engineering Department, University of Southern California, Los Angeles, CA 989 {doohuls, sandeep}@us.edu
More informationThe Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines
The Minimum Redundany Maximum Relevane Approah to Building Sparse Support Vetor Mahines Xiaoxing Yang, Ke Tang, and Xin Yao, Nature Inspired Computation and Appliations Laboratory (NICAL), Shool of Computer
More informationA Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering
A Novel Bit Level Time Series Representation with Impliation of Similarity Searh and lustering hotirat Ratanamahatana, Eamonn Keogh, Anthony J. Bagnall 2, and Stefano Lonardi Dept. of omputer Siene & Engineering,
More informationVolume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om A New-Fangled Algorithm
More informationKERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION
KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION Cuiui Kang 1, Shengai Liao, Shiming Xiang 1, Chunhong Pan 1 1 National Laboratory of Pattern Reognition, Institute of Automation, Chinese
More informationDetecting Outliers in High-Dimensional Datasets with Mixed Attributes
Deteting Outliers in High-Dimensional Datasets with Mixed Attributes A. Koufakou, M. Georgiopoulos, and G.C. Anagnostopoulos 2 Shool of EECS, University of Central Florida, Orlando, FL, USA 2 Dept. of
More informationGray Codes for Reflectable Languages
Gray Codes for Refletable Languages Yue Li Joe Sawada Marh 8, 2008 Abstrat We lassify a type of language alled a refletable language. We then develop a generi algorithm that an be used to list all strings
More informationFacility Location: Distributed Approximation
Faility Loation: Distributed Approximation Thomas Mosibroda Roger Wattenhofer Distributed Computing Group PODC 2005 Where to plae ahes in the Internet? A distributed appliation that has to dynamially plae
More informationPerformance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application
World Aademy of Siene, Engineering and Tehnology 8 009 Performane of Histogram-Based Skin Colour Segmentation for Arms Detetion in Human Motion Analysis Appliation Rosalyn R. Porle, Ali Chekima, Farrah
More informationAbstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1.
Fuzzy Weighted Rank Ordered Mean (FWROM) Filters for Mixed Noise Suppression from Images S. Meher, G. Panda, B. Majhi 3, M.R. Meher 4,,4 Department of Eletronis and I.E., National Institute of Tehnology,
More informationPipelined Multipliers for Reconfigurable Hardware
Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,
More informationNONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman
NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION Ken Sauer and Charles A. Bouman Department of Eletrial Engineering, University of Notre Dame Notre Dame, IN 46556, (219) 631-6999 Shool of
More informationOutline: Software Design
Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling
More informationNew Fuzzy Object Segmentation Algorithm for Video Sequences *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 521-537 (2008) New Fuzzy Obet Segmentation Algorithm for Video Sequenes * KUO-LIANG CHUNG, SHIH-WEI YU, HSUEH-JU YEH, YONG-HUAI HUANG AND TA-JEN YAO Department
More informationarxiv: v1 [cs.db] 13 Sep 2017
An effiient lustering algorithm from the measure of loal Gaussian distribution Yuan-Yen Tai (Dated: May 27, 2018) In this paper, I will introdue a fast and novel lustering algorithm based on Gaussian distribution
More informationA DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR
Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and
More informationA Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks
International Journal of Advanes in Computer Networks and Its Seurity IJCNS A Load-Balaned Clustering Protool for Hierarhial Wireless Sensor Networks Mehdi Tarhani, Yousef S. Kavian, Saman Siavoshi, Ali
More informationUnsupervised Stereoscopic Video Object Segmentation Based on Active Contours and Retrainable Neural Networks
Unsupervised Stereosopi Video Objet Segmentation Based on Ative Contours and Retrainable Neural Networks KLIMIS NTALIANIS, ANASTASIOS DOULAMIS, and NIKOLAOS DOULAMIS National Tehnial University of Athens
More informationDr.Hazeem Al-Khafaji Dept. of Computer Science, Thi-Qar University, College of Science, Iraq
Volume 4 Issue 6 June 014 ISSN: 77 18X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om Medial Image Compression using
More informationOn - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2
On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,
More informationNaïve Bayesian Rough Sets Under Fuzziness
IJMSA: Vol. 6, No. 1-2, January-June 2012, pp. 19 25 Serials Publiations ISSN: 0973-6786 Naïve ayesian Rough Sets Under Fuzziness G. GANSAN 1,. KRISHNAVNI 2 T. HYMAVATHI 3 1,2,3 Department of Mathematis,
More informationExploiting Enriched Contextual Information for Mobile App Classification
Exploiting Enrihed Contextual Information for Mobile App Classifiation Hengshu Zhu 1 Huanhuan Cao 2 Enhong Chen 1 Hui Xiong 3 Jilei Tian 2 1 University of Siene and Tehnology of China 2 Nokia Researh Center
More informationTUMOR DETECTION IN MRI BRAIN IMAGE SEGMENTATION USING PHASE CONGRUENCY MODIFIED FUZZY C MEAN ALGORITHM
TUMOR DETECTION IN MRI BRAIN IMAGE SEGMENTATION USING PHASE CONGRUENCY MODIFIED FUZZY C MEAN ALGORITHM M. Murugeswari 1, M.Gayathri 2 1 Assoiate Professor, 2 PG Sholar 1,2 K.L.N College of Information
More informationthe data. Structured Principal Component Analysis (SPCA)
Strutured Prinipal Component Analysis Kristin M. Branson and Sameer Agarwal Department of Computer Siene and Engineering University of California, San Diego La Jolla, CA 9193-114 Abstrat Many tasks involving
More informationTime delay estimation of reverberant meeting speech: on the use of multichannel linear prediction
University of Wollongong Researh Online Faulty of Informatis - apers (Arhive) Faulty of Engineering and Information Sienes 7 Time delay estimation of reverberant meeting speeh: on the use of multihannel
More informationDetection and Recognition of Non-Occluded Objects using Signature Map
6th WSEAS International Conferene on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, De 9-31, 007 65 Detetion and Reognition of Non-Oluded Objets using Signature Map Sangbum Park,
More informationFuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis
Journal of Computer Siene 4 (): 9-97, 008 ISSN 549-3636 008 Siene Publiations Fuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis Deepti Gaur, Aditya Shastri and Ranjit Biswas Department of Computer
More informationCluster Centric Fuzzy Modeling
10.1109/TFUZZ.014.300134, IEEE Transations on Fuzzy Systems TFS-013-0379.R1 1 Cluster Centri Fuzzy Modeling Witold Pedryz, Fellow, IEEE, and Hesam Izakian, Student Member, IEEE Abstrat In this study, we
More informationAn Alternative Approach to the Fuzzifier in Fuzzy Clustering to Obtain Better Clustering Results
An Alternative Approah to the Fuzziier in Fuzzy Clustering to Obtain Better Clustering Results Frank Klawonn Department o Computer Siene University o Applied Sienes BS/WF Salzdahlumer Str. 46/48 D-38302
More informationMulti-modal Clustering for Multimedia Collections
Multi-modal Clustering for Multimedia Colletions Ron Bekkerman and Jiwoon Jeon Center for Intelligent Information Retrieval University of Massahusetts at Amherst, USA {ronb jeon}@s.umass.edu Abstrat Most
More informationTrajectory Tracking Control for A Wheeled Mobile Robot Using Fuzzy Logic Controller
Trajetory Traking Control for A Wheeled Mobile Robot Using Fuzzy Logi Controller K N FARESS 1 M T EL HAGRY 1 A A EL KOSY 2 1 Eletronis researh institute, Cairo, Egypt 2 Faulty of Engineering, Cairo University,
More informationSegmentation of brain MR image using fuzzy local Gaussian mixture model with bias field correction
IOSR Journal of VLSI and Signal Proessing (IOSR-JVSP) Volume 2, Issue 2 (Mar. Apr. 2013), PP 35-41 e-issn: 2319 4200, p-issn No. : 2319 4197 Segmentation of brain MR image using fuzzy loal Gaussian mixture
More informationDETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT
DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT 1 ZHANGGUO TANG, 2 HUANZHOU LI, 3 MINGQUAN ZHONG, 4 JIAN ZHANG 1 Institute of Computer Network and Communiation Tehnology,
More informationParallelizing Frequent Web Access Pattern Mining with Partial Enumeration for High Speedup
Parallelizing Frequent Web Aess Pattern Mining with Partial Enumeration for High Peiyi Tang Markus P. Turkia Department of Computer Siene Department of Computer Siene University of Arkansas at Little Rok
More informationFUZZY WATERSHED FOR IMAGE SEGMENTATION
FUZZY WATERSHED FOR IMAGE SEGMENTATION Ramón Moreno, Manuel Graña Computational Intelligene Group, Universidad del País Vaso, Spain http://www.ehu.es/winto; {ramon.moreno,manuel.grana}@ehu.es Abstrat The
More informationFOREGROUND OBJECT EXTRACTION USING FUZZY C MEANS WITH BIT-PLANE SLICING AND OPTICAL FLOW
FOREGROUND OBJECT EXTRACTION USING FUZZY C EANS WITH BIT-PLANE SLICING AND OPTICAL FLOW SIVAGAI., REVATHI.T, JEGANATHAN.L 3 APSG, SCSE, VIT University, Chennai, India JRF, DST, Dehi, India. 3 Professor,
More informationAn Automatic Laser Scanning System for Accurate 3D Reconstruction of Indoor Scenes
An Automati Laser Sanning System for Aurate 3D Reonstrution of Indoor Senes Danrong Li, Honglong Zhang, and Zhan Song Shenzhen Institutes of Advaned Tehnology Chinese Aademy of Sienes Shenzhen, Guangdong
More informationAdaptive Implicit Surface Polygonization using Marching Triangles
Volume 20 (2001), Number 2 pp. 67 80 Adaptive Impliit Surfae Polygonization using Marhing Triangles Samir Akkouhe Eri Galin L.I.G.I.M L.I.G.I.M Eole Centrale de Lyon Université Claude Bernard Lyon 1 B.P.
More informationContents Contents...I List of Tables...VIII List of Figures...IX 1. Introduction Information Retrieval... 8
Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introdution... 1 1.1. Internet Information...2 1.2. Internet Information Retrieval...3 1.2.1. Doument Indexing...4 1.2.2. Doument Retrieval...4
More informationAn Efficient and Scalable Approach to CNN Queries in a Road Network
An Effiient and Salable Approah to CNN Queries in a Road Network Hyung-Ju Cho Chin-Wan Chung Dept. of Eletrial Engineering & Computer Siene Korea Advaned Institute of Siene and Tehnology 373- Kusong-dong,
More informationSelf-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization
Self-Adaptive Parent to Mean-Centri Reombination for Real-Parameter Optimization Kalyanmoy Deb and Himanshu Jain Department of Mehanial Engineering Indian Institute of Tehnology Kanpur Kanpur, PIN 86 {deb,hjain}@iitk.a.in
More informationA Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks
A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr
More informationCleanUp: Improving Quadrilateral Finite Element Meshes
CleanUp: Improving Quadrilateral Finite Element Meshes Paul Kinney MD-10 ECC P.O. Box 203 Ford Motor Company Dearborn, MI. 8121 (313) 28-1228 pkinney@ford.om Abstrat: Unless an all quadrilateral (quad)
More informationThe Implementation of RRTs for a Remote-Controlled Mobile Robot
ICCAS5 June -5, KINEX, Gyeonggi-Do, Korea he Implementation of RRs for a Remote-Controlled Mobile Robot Chi-Won Roh*, Woo-Sub Lee **, Sung-Chul Kang *** and Kwang-Won Lee **** * Intelligent Robotis Researh
More informationAlgorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking
Algorithms for External Memory Leture 6 Graph Algorithms - Weighted List Ranking Leturer: Nodari Sithinava Sribe: Andi Hellmund, Simon Ohsenreither 1 Introdution & Motivation After talking about I/O-effiient
More informationA {k, n}-secret Sharing Scheme for Color Images
A {k, n}-seret Sharing Sheme for Color Images Rastislav Luka, Konstantinos N. Plataniotis, and Anastasios N. Venetsanopoulos The Edward S. Rogers Sr. Dept. of Eletrial and Computer Engineering, University
More informationtimestamp, if silhouette(x, y) 0 0 if silhouette(x, y) = 0, mhi(x, y) = and mhi(x, y) < timestamp - duration mhi(x, y), else
3rd International Conferene on Multimedia Tehnolog(ICMT 013) An Effiient Moving Target Traking Strateg Based on OpenCV and CAMShift Theor Dongu Li 1 Abstrat Image movement involved bakground movement and
More informationMethods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems
Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems Arne Hamann, Razvan Rau, Rolf Ernst Institute of Computer and Communiation Network Engineering Tehnial University of Braunshweig,
More informationSemi-Supervised Affinity Propagation with Instance-Level Constraints
Semi-Supervised Affinity Propagation with Instane-Level Constraints Inmar E. Givoni, Brendan J. Frey Probabilisti and Statistial Inferene Group University of Toronto 10 King s College Road, Toronto, Ontario,
More informationCapturing Large Intra-class Variations of Biometric Data by Template Co-updating
Capturing Large Intra-lass Variations of Biometri Data by Template Co-updating Ajita Rattani University of Cagliari Piazza d'armi, Cagliari, Italy ajita.rattani@diee.unia.it Gian Lua Marialis University
More informationA New RBFNDDA-KNN Network and Its Application to Medical Pattern Classification
A New RBFNDDA-KNN Network and Its Appliation to Medial Pattern Classifiation Shing Chiang Tan 1*, Chee Peng Lim 2, Robert F. Harrison 3, R. Lee Kennedy 4 1 Faulty of Information Siene and Tehnology, Multimedia
More informationVideo Data and Sonar Data: Real World Data Fusion Example
14th International Conferene on Information Fusion Chiago, Illinois, USA, July 5-8, 2011 Video Data and Sonar Data: Real World Data Fusion Example David W. Krout Applied Physis Lab dkrout@apl.washington.edu
More informationWhat are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study
What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The
More informationA Fast Kernel-based Multilevel Algorithm for Graph Clustering
A Fast Kernel-based Multilevel Algorithm for Graph Clustering Inderjit Dhillon Dept. of Computer Sienes University of Texas at Austin Austin, TX 78712 inderjit@s.utexas.edu Yuqiang Guan Dept. of Computer
More informationBoosted Random Forest
Boosted Random Forest Yohei Mishina, Masamitsu suhiya and Hironobu Fujiyoshi Department of Computer Siene, Chubu University, 1200 Matsumoto-ho, Kasugai, Aihi, Japan {mishi, mtdoll}@vision.s.hubu.a.jp,
More informationEvolutionary Feature Synthesis for Image Databases
Evolutionary Feature Synthesis for Image Databases Anlei Dong, Bir Bhanu, Yingqiang Lin Center for Researh in Intelligent Systems University of California, Riverside, California 92521, USA {adong, bhanu,
More informationMultiple-Criteria Decision Analysis: A Novel Rank Aggregation Method
3537 Multiple-Criteria Deision Analysis: A Novel Rank Aggregation Method Derya Yiltas-Kaplan Department of Computer Engineering, Istanbul University, 34320, Avilar, Istanbul, Turkey Email: dyiltas@ istanbul.edu.tr
More informationSocial Network Analysis Based on BSP Clustering Algorithm
Communiations of the IIMA Volume 7 Issue 4 Artile 5 7 Soial Network Analysis Based on BSP Clustering Algorithm ong Shool of Business Administration China University of Petroleum Follow this and additional
More informationAutomatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425)
Automati Physial Design Tuning: Workload as a Sequene Sanjay Agrawal Mirosoft Researh One Mirosoft Way Redmond, WA, USA +1-(425) 75-357 sagrawal@mirosoft.om Eri Chu * Computer Sienes Department University
More informationChromaticity-matched Superimposition of Foreground Objects in Different Environments
FCV216, the 22nd Korea-Japan Joint Workshop on Frontiers of Computer Vision Chromatiity-mathed Superimposition of Foreground Objets in Different Environments Yohei Ogura Graduate Shool of Siene and Tehnology
More informationAcoustic Links. Maximizing Channel Utilization for Underwater
Maximizing Channel Utilization for Underwater Aousti Links Albert F Hairris III Davide G. B. Meneghetti Adihele Zorzi Department of Information Engineering University of Padova, Italy Email: {harris,davide.meneghetti,zorzi}@dei.unipd.it
More informationA Method for Measuring Co-authorship Relationships in MediaWiki Libby Veng-Sam Tang Department of Computer and Information Siene Faulty of Siene and Tehnology University of Maau Maau S.A.R., China Tel:
More informationAn Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index
IJCSES International Journal of Computer Sienes and Engineering Systems, ol., No.4, Otober 2007 CSES International 2007 ISSN 0973-4406 253 An Optimized Approah on Applying Geneti Algorithm to Adaptive
More informationA Coarse-to-Fine Classification Scheme for Facial Expression Recognition
A Coarse-to-Fine Classifiation Sheme for Faial Expression Reognition Xiaoyi Feng 1,, Abdenour Hadid 1 and Matti Pietikäinen 1 1 Mahine Vision Group Infoteh Oulu and Dept. of Eletrial and Information Engineering
More informationCoprocessors, multi-scale modeling, fluid models and global warming. Chris Hill, MIT
Coproessors, multi-sale modeling, luid models and global warming. Chris Hill, MIT Outline Some motivation or high-resolution modeling o Earth oean system. the modeling hallenge An approah Sotware triks
More informationMulti-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality
INTERNATIONAL CONFERENCE ON MANUFACTURING AUTOMATION (ICMA200) Multi-Piee Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality Stephen Stoyan, Yong Chen* Epstein Department of
More informationImproved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules
Improved Vehile Classifiation in Long Traffi Video by Cooperating Traker and Classifier Modules Brendan Morris and Mohan Trivedi University of California, San Diego San Diego, CA 92093 {b1morris, trivedi}@usd.edu
More informationUsing Augmented Measurements to Improve the Convergence of ICP
Using Augmented Measurements to Improve the onvergene of IP Jaopo Serafin, Giorgio Grisetti Dept. of omputer, ontrol and Management Engineering, Sapienza University of Rome, Via Ariosto 25, I-0085, Rome,
More informationA scheme for racquet sports video analysis with the combination of audio-visual information
A sheme for raquet sports video analysis with the ombination of audio-visual information Liyuan Xing a*, Qixiang Ye b, Weigang Zhang, Qingming Huang a and Hua Yu a a Graduate Shool of the Chinese Aadamy
More informationCalculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem
Calulation of typial running time of a branh-and-bound algorithm for the vertex-over problem Joni Pajarinen, Joni.Pajarinen@iki.fi Otober 21, 2007 1 Introdution The vertex-over problem is one of a olletion
More informationAlgorithms, Mechanisms and Procedures for the Computer-aided Project Generation System
Algorithms, Mehanisms and Proedures for the Computer-aided Projet Generation System Anton O. Butko 1*, Aleksandr P. Briukhovetskii 2, Dmitry E. Grigoriev 2# and Konstantin S. Kalashnikov 3 1 Department
More informationContour Box: Rejecting Object Proposals Without Explicit Closed Contours
Contour Box: Rejeting Objet Proposals Without Expliit Closed Contours Cewu Lu, Shu Liu Jiaya Jia Chi-Keung Tang The Hong Kong University of Siene and Tehnology Stanford University The Chinese University
More informationSparse Certificates for 2-Connectivity in Directed Graphs
Sparse Certifiates for 2-Connetivity in Direted Graphs Loukas Georgiadis Giuseppe F. Italiano Aikaterini Karanasiou Charis Papadopoulos Nikos Parotsidis Abstrat Motivated by the emergene of large-sale
More informationA Dictionary based Efficient Text Compression Technique using Replacement Strategy
A based Effiient Text Compression Tehnique using Replaement Strategy Debashis Chakraborty Assistant Professor, Department of CSE, St. Thomas College of Engineering and Tehnology, Kolkata, 700023, India
More informationAustralian Journal of Basic and Applied Sciences. A new Divide and Shuffle Based algorithm of Encryption for Text Message
ISSN:1991-8178 Australian Journal of Basi and Applied Sienes Journal home page: www.ajbasweb.om A new Divide and Shuffle Based algorithm of Enryption for Text Message Dr. S. Muthusundari R.M.D. Engineering
More informationBrief description of the base clustering algorithms
Brief description of the base clustering algorithms Le Ou-Yang, Dao-Qing Dai, and Xiao-Fei Zhang In this paper, we choose ten state-of-the-art protein complex identification algorithms as base clustering
More informationBatch Auditing for Multiclient Data in Multicloud Storage
Advaned Siene and Tehnology Letters, pp.67-73 http://dx.doi.org/0.4257/astl.204.50. Bath Auditing for Multilient Data in Multiloud Storage Zhihua Xia, Xinhui Wang, Xingming Sun, Yafeng Zhu, Peng Ji and
More informationMining effective design solutions based on a model-driven approach
ata Mining VI 463 Mining effetive design solutions based on a model-driven approah T. Katsimpa 2, S. Sirmakessis 1,. Tsakalidis 1,2 & G. Tzimas 1,2 1 Researh ademi omputer Tehnology Institute, Hellas 2
More informationSmooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints
Smooth Trajetory Planning Along Bezier Curve for Mobile Robots with Veloity Constraints Gil Jin Yang and Byoung Wook Choi Department of Eletrial and Information Engineering Seoul National University of
More informationWe don t need no generation - a practical approach to sliding window RLNC
We don t need no generation - a pratial approah to sliding window RLNC Simon Wunderlih, Frank Gabriel, Sreekrishna Pandi, Frank H.P. Fitzek Deutshe Telekom Chair of Communiation Networks, TU Dresden, Dresden,
More informationIMPROVED FUZZY CLUSTERING METHOD BASED ON INTUITIONISTIC FUZZY PARTICLE SWARM OPTIMIZATION
Journal of Theoretial and Applied Information Tehnology IMPROVED FUZZY CLUSTERING METHOD BASED ON INTUITIONISTIC FUZZY PARTICLE SWARM OPTIMIZATION V.KUMUTHA, 2 S. PALANIAMMAL D.J. Aademy For Managerial
More informationFlow Demands Oriented Node Placement in Multi-Hop Wireless Networks
Flow Demands Oriented Node Plaement in Multi-Hop Wireless Networks Zimu Yuan Institute of Computing Tehnology, CAS, China {zimu.yuan}@gmail.om arxiv:153.8396v1 [s.ni] 29 Mar 215 Abstrat In multi-hop wireless
More informationParticle Swarm Optimization for the Design of High Diffraction Efficient Holographic Grating
Original Artile Partile Swarm Optimization for the Design of High Diffration Effiient Holographi Grating A.K. Tripathy 1, S.K. Das, M. Sundaray 3 and S.K. Tripathy* 4 1, Department of Computer Siene, Berhampur
More informationChemical, Biological and Radiological Hazard Assessment: A New Model of a Plume in a Complex Urban Environment
hemial, Biologial and Radiologial Haard Assessment: A New Model of a Plume in a omplex Urban Environment Skvortsov, A.T., P.D. Dawson, M.D. Roberts and R.M. Gailis HPP Division, Defene Siene and Tehnology
More informationDubins Path Planning of Multiple UAVs for Tracking Contaminant Cloud
Proeedings of the 17th World Congress The International Federation of Automati Control Dubins Path Planning of Multiple UAVs for Traking Contaminant Cloud S. Subhan, B.A. White, A. Tsourdos M. Shanmugavel,
More informationImproved flooding of broadcast messages using extended multipoint relaying
Improved flooding of broadast messages using extended multipoint relaying Pere Montolio Aranda a, Joaquin Garia-Alfaro a,b, David Megías a a Universitat Oberta de Catalunya, Estudis d Informàtia, Mulimèdia
More informationShape Outlier Detection Using Pose Preserving Dynamic Shape Models
Shape Outlier Detetion Using Pose Preserving Dynami Shape Models Chan-Su Lee Ahmed Elgammal Department of Computer Siene, Rutgers University, Pisataway, NJ 8854 USA CHANSU@CS.RUTGERS.EDU ELGAMMAL@CS.RUTGERS.EDU
More informationGradient based progressive probabilistic Hough transform
Gradient based progressive probabilisti Hough transform C.Galambos, J.Kittler and J.Matas Abstrat: The authors look at the benefits of exploiting gradient information to enhane the progressive probabilisti
More informationImproved Circuit-to-CNF Transformation for SAT-based ATPG
Improved Ciruit-to-CNF Transformation for SAT-based ATPG Daniel Tille 1 René Krenz-Bååth 2 Juergen Shloeffel 2 Rolf Drehsler 1 1 Institute of Computer Siene, University of Bremen, 28359 Bremen, Germany
More informationExploring the Commonality in Feature Modeling Notations
Exploring the Commonality in Feature Modeling Notations Miloslav ŠÍPKA Slovak University of Tehnology Faulty of Informatis and Information Tehnologies Ilkovičova 3, 842 16 Bratislava, Slovakia miloslav.sipka@gmail.om
More informationA Real Time Hybrid Pattern Matching Scheme for Stock Time Series
A Real Time Hybrid Pattern Mathing Sheme for Stok Time Series Zhe Zhang 1, Jian Jiang 2, Xiaoyan Liu 3, Riky Lau 4, Huaiqing Wang 4, Rui Zhang 3 1,4 Department of Information Systems, City University of
More informationBioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Improvement of low illumination image enhancement algorithm based on physical mode
[Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 22 BioTehnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(22), 2014 [13995-14001] Improvement of low illumination image enhanement
More information