Sciweavers

450 search results - page 13 / 90
» Algorithmic uses of the Feferman-Vaught Theorem
Sort
View
TKDE
2010
159views more  TKDE 2010»
13 years 5 months ago
The Tiled Bitmap Forensic Analysis Algorithm
— Tampering of a database can be detected through the use of cryptographically-strong hash functions. Subsequently-applied forensic analysis algorithms can help determine when, w...
Kyriacos E. Pavlou, Richard T. Snodgrass
CC
2010
Springer
117views System Software» more  CC 2010»
13 years 4 months ago
Efficiently Certifying Non-Integer Powers
We describe a randomized algorithm that, given an integer a, produces a certificate that the integer is not a pure power of an integer in expected (log a)1+o(1) bit operations unde...
Erich Kaltofen, Mark Lavin
COMPGEOM
2011
ACM
12 years 11 months ago
On the structure and composition of forbidden sequences, with geometric applications
Forbidden substructure theorems have proved to be among of the most versatile tools in bounding the complexity of geometric objects and the running time of geometric algorithms. T...
Seth Pettie
GCB
2004
Springer
101views Biometrics» more  GCB 2004»
14 years 26 days ago
Kleene's Theorem and the Solution of Metabolic Carbon Labeling Systems
: Carbon Labeling Systems (CLS) are large equation systems that describe the dynamics of labeled carbon atoms in a metabolic network. The rapid solution of these systems is the alg...
Nicole Isermann, Michael Weitzel, Wolfgang Wiecher...
ICASSP
2011
IEEE
12 years 11 months ago
Equalization of multichannel acoustic system using sub-systems for speech dereverberation
An auto-relation aided multiple-input/output inverse filtering algorithm (A-RAM) is proposed for the inverse filtering of room acoustics in speech dereverberation. In A-RAM, we ...
Lei Liao, Andy W. H. Khong