Search
Search Results
-
Improving Performance of Virtual Machine Covert Timing Channel Through Optimized Run-Length Encoding
With its wider acceptability, cloud can host a diverse set of data and applications ranging from entertainment to personal to industry. The...
-
Fast Exact Dynamic Time War** on Run-Length Encoded Time Series
Dynamic Time War** (DTW) is a well-known similarity measure for time series. The standard dynamic programming approach to compute the DTW distance...
-
A New Class of DC-Free Run-Length Limited Codes
The conventional 4B6B run-length limited (RLL) code recommended by the IEEE 802.15.7 standard for visible light communication (VLC) is memory... -
Spiral Based Run-Length Features for Offline Signature Verification
Automatic signature verification is one of the main modes to verify the identity of the individuals. Among the strategies to describe the signature... -
Code design for run-length control in visible light communication
Run-length limited (RLL) codes can facilitate reliable data transmission and provide flicker-free illumination in visible light communication (VLC)...
-
Fast Algorithms for the Shortest Unique Palindromic Substring Problem on Run-Length Encoded Strings
For a string S , a palindromic substring S [ i .. j ] is said to be a shortest unique palindromic substring ( S U P S ) for an interval [ s , t ] in S , if S [ i .. j ]...
-
Speicherung von Segmenten mit Run-Length-Coding
Immer mehr Anwendungen erfordern, Objekte in Echtzeit zu lokalisieren, zu erkennen oder zu verfolgen, wobei die zu verwendende... -
Centrifuger: Lossless Compression of Microbial Genomes for Efficient and Accurate Metagenomic Sequence Classification
Centrifuger is an efficient taxonomic classification method that compares sequencing reads against a microbial genome database. Due to the increasing... -
Construction of DNA codes with multiple constrained properties
DNA sequences are prone to creating secondary structures by folding back on themselves by non-specific hybridization of its nucleotides. The...
-
Generating Cyclic 2-Gray Codes for Fibonacci q-Decreasing Words
We present a two-stage algorithm for generating cyclic 2-Gray codes for q-decreasing words. In the first step, a simple recursive algorithm is used... -
Run-Length Encoding in a Finite Universe
Text compression schemes and compact data structures usually combine sophisticated probability models with basic coding methods whose average... -
Fast Edit Distance Prediction for All Pairs of Sequences in Very Large NGS Datasets
All the known edit distance calculation algorithms run in near quadratic time with respect to sequence length. For very large number of sequences... -
Denoising Epigraphical Estampages Using Nested Run Length Count
Denoising in epigraphical document analysis helps in building recognition system for fast and automatic processing. However, it is challenging due to... -
Beta regression residuals-based control charts with different link functions: an application to the thermal power plants data
In industries, quality monitoring tools are necessary for producing good quality products. Control charts are the most important tools for monitoring...
-
Shortest Unique Palindromic Substring Queries on Run-Length Encoded Strings
For a string S, a palindromic substring S[i..j] is said to be a shortest unique palindromic substring (... -
Data hiding with thumbnail-preserving encryption for cloud medical images
To serve a convenient healthcare network, storing medical images and diagnosis records in the cloud is a straightforward solution. Encrypting the...
-
Mining frequent Itemsets from transaction databases using hybrid switching framework
With the growing volume of data, mining Frequent Itemsets remains of paramount importance. These have applications in various domains such as market...
-
Gray codes over certain run-length sequences for local rank modulation
In the local rank modulation (LRM) scheme, a sliding window produces a sequence of permutations by moving over a sequence of variables. LRM has been...
-
On the Security of Encrypted JPEG Image with Adaptive Key Generated by Invariant Characteristic
Recently, a JPEG encryption scheme with adaptive key is proposed to improve the security of encrypted images. However, it still has a security risk... -
A Constant-Factor Approximation Algorithm for Online Coverage Path Planning with Energy Constraint
We study the problem of coverage planning by a mobile robot with a limited energy budget. The objective of the robot is to cover every point in the...