Sciweavers

CORR
2011
Springer
180views Education» more  CORR 2011»
13 years 6 months ago
A Formalization of Polytime Functions
Abstract. We present a deep embedding of Bellantoni and Cook’s syntactic characterization of polytime functions. We prove formally that it is correct and complete with respect to...
Sylvain Heraud, David Nowak
CORR
2011
Springer
204views Education» more  CORR 2011»
13 years 6 months ago
Accelerated Dual Descent for Network Optimization
—Dual descent methods are commonly used to solve network optimization problems because their implementation can be distributed through the network. However, their convergence rat...
Michael Zargham, A. Ribeiro, Ali Jadbabaie, Asuman...
CORR
2011
Springer
173views Education» more  CORR 2011»
13 years 6 months ago
Multiple-Source Single-Sink Maximum Flow in Directed Planar Graphs in O(diameter*n*log(n)) Time
We develop a new technique for computing maximum flow in directed planar graphs with multiple sources and a single sink that significantly deviates from previously known techniqu...
Philip N. Klein, Shay Mozes
CORR
2011
Springer
152views Education» more  CORR 2011»
13 years 6 months ago
Tiled QR factorization algorithms
Henricus Bouwmeester, Mathias Jacquelin, Julien La...
CORR
2011
Springer
124views Education» more  CORR 2011»
13 years 6 months ago
Parallel Recursive State Compression for Free
This paper focuses on reducing memory usage in enumerative model checking, while maintaining the multi-core scalability obtained in earlier work. We present a multi-core tree-based...
Alfons Laarman, Jaco van de Pol, Michael Weber 000...
CORR
2011
Springer
183views Education» more  CORR 2011»
13 years 6 months ago
Reconstruction of Binary Functions and Shapes from Incomplete Frequency Information
The characterization of a binary function by partial frequency information is considered. We show that it is possible to reconstruct the binary signal from incomplete frequency me...
Yu Mao
CORR
2011
Springer
151views Education» more  CORR 2011»
13 years 6 months ago
Generating and Searching Families of FFT Algorithms
A fundamental question of longstanding theoretical interest is to prove the lowest exact count of real additions and multiplications required to compute a power-of-two discrete Fo...
Steve Haynal, Heidi Haynal
CORR
2011
Springer
144views Education» more  CORR 2011»
13 years 6 months ago
Application of Threshold Techniques for Readability Improvement of Jawi Historical Manuscript Images
Hafizan Mat Som, Jasni Mohamad Zain, Amzari Jihadi...
CORR
2011
Springer
326views Education» more  CORR 2011»
13 years 6 months ago
Mining User Comment Activity for Detecting Forum Spammers in YouTube
Research shows that comment spamming (comments which are unsolicited, unrelated, abusive, hateful, commercial advertisements etc) in online discussion forums has become a common p...
Ashish Sureka
CORR
2011
Springer
247views Education» more  CORR 2011»
13 years 6 months ago
Medical Image Denoising using Adaptive Threshold Based on Contourlet Transform
S. Satheesh, K. V. S. V. R. Prasad