We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Improving Performance of Virtual Machine Covert Timing Channel Through Optimized Run-Length Encoding

    With its wider acceptability, cloud can host a diverse set of data and applications ranging from entertainment to personal to industry. The...

    Chong Wang, Rong-Liang Chen, Liang Gu in Journal of Computer Science and Technology
    Article 31 July 2023
  2. Fast Exact Dynamic Time War** on Run-Length Encoded Time Series

    Dynamic Time War** (DTW) is a well-known similarity measure for time series. The standard dynamic programming approach to compute the DTW distance...

    Vincent Froese, Brijnesh Jain, ... Mathias Weller in Algorithmica
    Article Open access 22 September 2022
  3. A New Class of DC-Free Run-Length Limited Codes

    The conventional 4B6B run-length limited (RLL) code recommended by the IEEE 802.15.7 standard for visible light communication (VLC) is memory...
    Elie Ngomseu Mambou, Jules M. Moualeu, Theo G. Swart in Pan-African Artificial Intelligence and Smart Systems
    Conference paper 2023
  4. Spiral Based Run-Length Features for Offline Signature Verification

    Automatic signature verification is one of the main modes to verify the identity of the individuals. Among the strategies to describe the signature...
    Walid Bouamra, Moises Diaz, ... Brahim Nini in Intertwining Graphonomics with Human Movements
    Conference paper 2022
  5. Code design for run-length control in visible light communication

    Run-length limited (RLL) codes can facilitate reliable data transmission and provide flicker-free illumination in visible light communication (VLC)...

    Zong-yan Li, Hong-lu Yu, ... Shi-yin Li in Frontiers of Information Technology & Electronic Engineering
    Article 17 September 2020
  6. Fast Algorithms for the Shortest Unique Palindromic Substring Problem on Run-Length Encoded Strings

    For a string S , a palindromic substring S [ i .. j ] is said to be a shortest unique palindromic substring ( S U P S ) for an interval [ s , t ] in S , if S [ i .. j ]...

    Kiichi Watanabe, Yuto Nakashima, ... Masayuki Takeda in Theory of Computing Systems
    Article 09 May 2020
  7. Speicherung von Segmenten mit Run-Length-Coding

    Immer mehr Anwendungen erfordern, Objekte in Echtzeit zu lokalisieren, zu erkennen oder zu verfolgen, wobei die zu verwendende...
    Alfred Nischwitz, Max Fischer, ... Gudrun Socher in Bildverarbeitung
    Chapter 2020
  8. Centrifuger: Lossless Compression of Microbial Genomes for Efficient and Accurate Metagenomic Sequence Classification

    Centrifuger is an efficient taxonomic classification method that compares sequencing reads against a microbial genome database. Due to the increasing...
    Conference paper 2024
  9. Construction of DNA codes with multiple constrained properties

    DNA sequences are prone to creating secondary structures by folding back on themselves by non-specific hybridization of its nucleotides. The...

    Siddhartha Siddhiprada Bhoi, Udaya Parampalli, Abhay Kumar Singh in Cryptography and Communications
    Article 14 May 2024
  10. Generating Cyclic 2-Gray Codes for Fibonacci q-Decreasing Words

    We present a two-stage algorithm for generating cyclic 2-Gray codes for q-decreasing words. In the first step, a simple recursive algorithm is used...
    Dennis Wong, Bowie Liu, ... Marcus Im in WALCOM: Algorithms and Computation
    Conference paper 2024
  11. Run-Length Encoding in a Finite Universe

    Text compression schemes and compact data structures usually combine sophisticated probability models with basic coding methods whose average...
    Conference paper 2019
  12. Fast Edit Distance Prediction for All Pairs of Sequences in Very Large NGS Datasets

    All the known edit distance calculation algorithms run in near quadratic time with respect to sequence length. For very large number of sequences...
    A. K. M. Tauhidul Islam, Sakti Pramanik in Advances in Knowledge Discovery and Data Mining
    Conference paper 2024
  13. Denoising Epigraphical Estampages Using Nested Run Length Count

    Denoising in epigraphical document analysis helps in building recognition system for fast and automatic processing. However, it is challenging due to...
    P. Preethi, K. Praneeth Kumar, ... H. R. Mamatha in Ubiquitous Communications and Network Computing
    Conference paper 2019
  14. Beta regression residuals-based control charts with different link functions: an application to the thermal power plants data

    In industries, quality monitoring tools are necessary for producing good quality products. Control charts are the most important tools for monitoring...

    Muhammad Amin, Azka Noor, Tahir Mahmood in International Journal of Data Science and Analytics
    Article 22 January 2024
  15. Shortest Unique Palindromic Substring Queries on Run-Length Encoded Strings

    For a string S, a palindromic substring S[i..j] is said to be a shortest unique palindromic substring (...
    Kiichi Watanabe, Yuto Nakashima, ... Masayuki Takeda in Combinatorial Algorithms
    Conference paper 2019
  16. Data hiding with thumbnail-preserving encryption for cloud medical images

    To serve a convenient healthcare network, storing medical images and diagnosis records in the cloud is a straightforward solution. Encrypting the...

    Shuying Xu, Chin-Chen Chang, Ji-Hwei Horng in Multimedia Tools and Applications
    Article 08 April 2024
  17. Mining frequent Itemsets from transaction databases using hybrid switching framework

    With the growing volume of data, mining Frequent Itemsets remains of paramount importance. These have applications in various domains such as market...

    P.P Jashma Suresh, U Dinesh Acharya, N.V. Subba Reddy in Multimedia Tools and Applications
    Article 16 February 2023
  18. Gray codes over certain run-length sequences for local rank modulation

    In the local rank modulation (LRM) scheme, a sliding window produces a sequence of permutations by moving over a sequence of variables. LRM has been...

    **ang Wang, Fang-Wei Fu in Science China Information Sciences
    Article 21 August 2018
  19. On the Security of Encrypted JPEG Image with Adaptive Key Generated by Invariant Characteristic

    Recently, a JPEG encryption scheme with adaptive key is proposed to improve the security of encrypted images. However, it still has a security risk...
    Yuan Yuan, Hongjie He, Fan Chen in Digital Forensics and Watermarking
    Conference paper 2022
  20. A Constant-Factor Approximation Algorithm for Online Coverage Path Planning with Energy Constraint

    We study the problem of coverage planning by a mobile robot with a limited energy budget. The objective of the robot is to cover every point in the...
    Ayan Dutta, Gokarna Sharma in Intelligent Human Computer Interaction
    Conference paper 2023
Did you find what you were looking for? Share feedback.