Sciweavers

DMIN
2009
223views Data Mining» more  DMIN 2009»
13 years 9 months ago
Are Decision Trees Always Greener on the Open (Source) Side of the Fence?
- This short paper compares the performance of three popular decision tree algorithms: C4.5, C5.0, and WEKA's J48. These decision tree algorithms are all related in that C5.0 ...
Samuel Moore, Daniel D'Addario, James Kurinskas, G...
CPM
2009
Springer
183views Combinatorics» more  CPM 2009»
13 years 9 months ago
Permuted Longest-Common-Prefix Array
The longest-common-prefix (LCP) array is an adjunct to the suffix array that allows many string processing problems to be solved in optimal time and space. Its construction is a bo...
Juha Kärkkäinen, Giovanni Manzini, Simon...
CORR
2009
Springer
114views Education» more  CORR 2009»
13 years 9 months ago
Distributed Branching Bisimulation Minimization by Inductive Signatures
We present a new distributed algorithm for state space minimization modulo branching bisimulation. Like its predecessor it uses signatures for refinement, but the refinement proce...
Stefan Blom, Jaco van de Pol
CIARP
2009
Springer
13 years 9 months ago
Incorporating Linguistic Information to Statistical Word-Level Alignment
Abstract. Parallel texts are enriched by alignment algorithms, thus establishing a relationship between the structures of the implied languages. Depending on the alignment level, t...
Eduardo Cendejas, Grettel Barceló, Alexande...
BILDMED
2009
152views Algorithms» more  BILDMED 2009»
13 years 9 months ago
Triple-Modality Normalized Mutual Information Based Medical Image Registration of Cardiac PET/CT and SPECT Images
Abstract. An extension of the normalized mutual information similarity measurement was proposed to register cardiac PET/CT and SPECT images representing coronary artery disease in ...
Laszlo Papp, Maaz Zuhayra, Reinhard Koch
ASIAN
2009
Springer
269views Algorithms» more  ASIAN 2009»
13 years 9 months ago
Noninterference with Dynamic Security Domains and Policies
Abstract. Language-based information flow analysis is used to statically examine a program for information flows between objects of different security domains, and to verify these ...
Robert Grabowski, Lennart Beringer
APWEB
2009
Springer
13 years 9 months ago
Core-Tag Clustering for Web 2.0 Based on Multi-similarity Measurements
Along with the development of Web2.0, folksonomy has become a hot topic related to data mining, information retrieval and social network. The tag semantic is the key for deep under...
Yexi Jiang, Changjie Tang, Kaikuo Xu, Lei Duan, Li...
APPROX
2009
Springer
105views Algorithms» more  APPROX 2009»
13 years 9 months ago
Real-Time Message Routing and Scheduling
Abstract. Exchanging messages between nodes of a network (e.g., embedded computers) is a fundamental issue in real-time systems involving critical routing and scheduling decisions....
Ronald Koch, Britta Peis, Martin Skutella, Andreas...
ALENEX
2009
172views Algorithms» more  ALENEX 2009»
13 years 9 months ago
Rank Aggregation: Together We're Strong
We consider the problem of finding a ranking of a set of elements that is "closest to" a given set of input rankings of the elements; more precisely, we want to find a p...
Frans Schalekamp, Anke van Zuylen
ALDT
2009
Springer
158views Algorithms» more  ALDT 2009»
13 years 9 months ago
Axioms for a Class of Algorithms of Sequential Decision Making
Abstract. We axiomatically characterise a class of algorithms for making sequential decisions in situations of complete ignorance. These algorithms assume that a decision maker (DM...
Murali Agastya, Arkadii M. Slinko