Sciweavers

2194 search results - page 18 / 439
» Improving HLRTA*( k )
Sort
View
FCT
2007
Springer
15 years 7 months ago
Analysis of Approximation Algorithms for k-Set Cover Using Factor-Revealing Linear Programs
We present new combinatorial approximation algorithms for k-set cover. Previous approaches are based on extending the greedy algorithm by efficiently handling small sets. The new a...
Stavros Athanassopoulos, Ioannis Caragiannis, Chri...
91
Voted
ICANN
2005
Springer
15 years 6 months ago
Mutual Information and k-Nearest Neighbors Approximator for Time Series Prediction
This paper presents a method that combines Mutual Information and k-Nearest Neighbors approximator for time series prediction. Mutual Information is used for input selection. K-Nea...
Antti Sorjamaa, Jin Hao, Amaury Lendasse
107
Voted
WALCOM
2010
IEEE
255views Algorithms» more  WALCOM 2010»
15 years 8 months ago
A Global k-Level Crossing Reduction Algorithm
Abstract. Directed graphs are commonly drawn by the Sugiyama algorithm, where crossing reduction is a crucial phase. It is done by repeated one-sided 2-level crossing minimizations...
Christian Bachmaier, Franz-Josef Brandenburg, Wolf...
137
Voted
ICC
2008
IEEE
176views Communications» more  ICC 2008»
15 years 7 months ago
A k-Nearest Neighbor Approach for User Authentication through Biometric Keystroke Dynamics
— Keystroke dynamics exhibit people’s behavioral features which are similar to hand signatures. A major problem hindering the large scale deployment of this technology is its h...
Jiankun Hu, Don Gingrich, Andy Sentosa
88
Voted
MFCS
2009
Springer
15 years 7 months ago
The Isomorphism Problem for k-Trees Is Complete for Logspace
Abstract. We show that k-tree isomorphism can be decided in logarithmic space by giving a logspace canonical labeling algorithm. This improves over the previous StUL upper bound an...
Johannes Köbler, Sebastian Kuhnert