Sciweavers

ISCI
2008
107views more  ISCI 2008»
13 years 11 months ago
Constructing vertex-disjoint paths in (n, k)-star graphs
This work develops a novel general routing algorithm, which is a routing function, for constructing a container of width n1 between any pair of vertices in an (n, k)-star graph wi...
Tsung-Chi Lin, Dyi-Rong Duh
ISCI
2008
104views more  ISCI 2008»
13 years 11 months ago
Unconditionally secure cryptosystems based on quantum cryptography
Most modern cryptographic studies design cryptosystems and algorithms using mathematical concepts. In designing and analyzing cryptosystems and protocols, mathematical concepts ar...
Yu-Fang Chung, Zhen Yu Wu, Tzer-Shyong Chen
ISCI
2008
95views more  ISCI 2008»
13 years 11 months ago
Modified constrained learning algorithms incorporating additional functional constraints into neural networks
In this paper, two modified constrained learning algorithms are proposed to obtain better generalization performance and faster convergence rate. The additional cost terms of the ...
Fei Han, Qing-Hua Ling, De-Shuang Huang
ISCI
2006
95views more  ISCI 2006»
13 years 11 months ago
Roughness bounds in rough set operations
This paper presents some roughness bounds for rough set operations. The results show that a bound of the set operation can be determined from their operand's roughnesses. We ...
Yingjie Yang, Robert John
ISCI
2006
58views more  ISCI 2006»
13 years 11 months ago
Streaming data reduction using low-memory factored representations
Many special purpose algorithms exist for extracting information from streaming data. Constraints are imposed on the total memory and on the average processing time per data item....
David Littau, Daniel Boley
ISCI
2006
68views more  ISCI 2006»
13 years 11 months ago
Qualitative reasoning about consistency in geographic information
Matt Duckham, Jenny Lingham, Keith T. Mason, Micha...
ISCI
2006
167views more  ISCI 2006»
13 years 11 months ago
Efficient unbalanced merge-sort
Sorting algorithms based on successive merging of ordered subsequences are widely used, due to their efficiency and to their intrinsically parallelizable structure. Among them, th...
Enrico Nardelli, Guido Proietti
ISCI
2006
76views more  ISCI 2006»
13 years 11 months ago
A cubic-wise balance approach for privacy preservation in data cubes
Yao Liu, Sam Yuan Sung, Hui Xiong
ISCI
2006
96views more  ISCI 2006»
13 years 11 months ago
A comparison of classification accuracy of four genetic programming-evolved intelligent structures
We investigate the effectiveness of GP-generated intelligent structures in classification tasks. Specifically, we present and use four context-free grammars to describe (1) decisi...
Athanasios Tsakonas
ISCI
2006
66views more  ISCI 2006»
13 years 11 months ago
Identification of defect-prone classes in telecommunication software systems using design metrics
Andrea Janes, Marco Scotto, Witold Pedrycz, Barbar...