Sciweavers

CORR
2010
Springer
160views Education» more  CORR 2010»
13 years 11 months ago
PCA 4 DCA: The Application Of Principal Component Analysis To The Dendritic Cell Algorithm
As one of the newest members in the field of artificial immune systems (AIS), the Dendritic Cell Algorithm (DCA) is based on behavioural models of natural dendritic cells (DCs). U...
Feng Gu, Julie Greensmith, Robert Oates, Uwe Aicke...
CORR
2010
Springer
126views Education» more  CORR 2010»
13 years 11 months ago
Towards Providing Low-Risk and Economically Feasible Network Data Transfer Services
: - In the first part of this paper we present the first steps towards providing low-risk and economically feasible network data transfer services. We introduce three types of data...
Mugurel Ionut Andreica, Vasile Deac, Stelian Tipa
CORR
2010
Springer
112views Education» more  CORR 2010»
13 years 11 months ago
Approximation Algorithms for Dominating Set in Disk Graphs
We consider the problem of finding a lowest cost dominating set in a given disk graph containing n disks. The problem has been extensively studied on subclasses of disk graphs, ye...
Matt Gibson, Imran A. Pirwani
CORR
2010
Springer
98views Education» more  CORR 2010»
13 years 11 months ago
A Fast Approach to Creative Telescoping
Abstract. In this note we reinvestigate the task of computing creative telescoping relations in differential-difference operator algebras. Our approach is based on an ansatz that e...
Christoph Koutschan
CORR
2010
Springer
186views Education» more  CORR 2010»
13 years 11 months ago
Color Image Compression Based On Wavelet Packet Best Tree
In Image Compression, the researchers' aim is to reduce the number of bits required to represent an image by removing the spatial and spectral redundancies. Recently discrete...
Gajanan K. Kharate, Varsha H. Patil
CORR
2010
Springer
161views Education» more  CORR 2010»
13 years 11 months ago
Database Reverse Engineering based on Association Rule Mining
Maintaining a legacy database is a difficult task especially when system documentation is poor written or even missing. Database reverse engineering is an attempt to recover high-...
Nattapon Pannurat, Nittaya Kerdprasop, Kittisak Ke...
CORR
2010
Springer
197views Education» more  CORR 2010»
13 years 11 months ago
Modelling of Human Glottis in VLSI for Low Power Architectures
The Glottal Source is an important component of voice as it can be considered as the excitation signal to the voice apparatus. Nowadays, new techniques of speech processing such a...
Nikhil Raj, R. K. Sharma
CORR
2010
Springer
65views Education» more  CORR 2010»
13 years 11 months ago
Offline Handwriting Recognition using Genetic Algorithm
Rahul Kala, Harsh Vazirani, Anupam Shukla, Ritu Ti...
CORR
2010
Springer
92views Education» more  CORR 2010»
13 years 11 months ago
The Complexity of Finding Reset Words in Finite Automata
We study several problems related to finding reset words in deterministic finite automata. In particular, we establish that the problem of deciding whether a shortest reset word ha...
Jörg Olschewski, Michael Ummels