Skip Content
You are currently on the new version of our website. Access the old version .

Algorithms, Volume 5, Issue 4

2012 December - 15 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (15)

  • Article
  • Open Access
3 Citations
8,550 Views
18 Pages

13 December 2012

The aim of this work is the extraction of edges from Magnetic Resonance Imaging (MRI) and Diffusion Tensor Imaging (DTI) images by a deformable contour procedure, using an external force field derived from an anisotropic flow. Moreover, we introduce...

  • Article
  • Open Access
5 Citations
6,759 Views
7 Pages

Testing Goodness of Fit of Random Graph Models

  • Villõ Csiszár,
  • Péter Hussami,
  • János Komlós,
  • Tamás F. Móri,
  • Lídia Rejtõ and
  • Gábor Tusnády

6 December 2012

Random graphs are matrices with independent 0–1 elements with probabilities determined by a small number of parameters. One of the oldest models is the Rasch model where the odds are ratios of positive numbers scaling the rows and columns. Later Pers...

  • Article
  • Open Access
33 Citations
13,525 Views
25 Pages

22 November 2012

The C library libkww provides functions to compute the Kohlrausch–Williams– Watts function, i.e., the Laplace–Fourier transform of the stretched (or compressed) exponential function exp(-tβ ) for exponents β between 0.1 and 1.9 with double precision....

  • Article
  • Open Access
404 Citations
52,921 Views
16 Pages

21 November 2012

We present a new method for automatic detection of peaks in noisy periodic and quasi-periodic signals. The new method, called automatic multiscale-based peak detection (AMPD), is based on the calculation and analysis of the local maxima scalogram, a...

  • Article
  • Open Access
69 Citations
16,325 Views
43 Pages

19 November 2012

We investigate a number of recently reported exact algorithms for the maximum clique problem. The program code is presented and analyzed to show how small changes in implementation can have a drastic effect on performance. The computational study dem...

  • Article
  • Open Access
9 Citations
7,924 Views
16 Pages

7 November 2012

Regularized Heaviside and Dirac delta function are used in several fields of computational physics and mechanics. Hence the issue of the quadrature of integrals of discontinuous and singular functions arises. In order to avoid ad-hoc quadrature proce...

  • Article
  • Open Access
5 Citations
12,199 Views
8 Pages

5 November 2012

The minimax algorithm, also called the negamax algorithm, remains today the most widely used search technique for two-player perfect-information games. However, minimaxing has been shown to be susceptible to game tree pathology, a paradoxical situati...

  • Article
  • Open Access
2 Citations
6,669 Views
15 Pages

23 October 2012

In this paper we present the PHOCS-2 algorithm, which extracts a “Predicted Hierarchy Of ClassifierS”. The extracted hierarchy helps us to enhance performance of flat classification. Nodes in the hierarchy contain classifiers. Each intermediate node...

  • Article
  • Open Access
7,162 Views
16 Pages

The Effects of Tabular-Based Content Extraction on Patent Document Clustering

  • Denise R. Koessler,
  • Benjamin W. Martin,
  • Bruce E. Kiefer and
  • Michael W. Berry

22 October 2012

Data can be represented in many different ways within a particular document or set of documents. Hence, attempts to automatically process the relationships between documents or determine the relevance of certain document objects can be problematic. I...

  • Article
  • Open Access
30 Citations
17,148 Views
21 Pages

Contextual Anomaly Detection in Text Data

  • Amogh Mahapatra,
  • Nisheeth Srivastava and
  • Jaideep Srivastava

19 October 2012

We propose using side information to further inform anomaly detection algorithms of the semantic context of the text data they are analyzing, thereby considering both divergence from the statistical pattern seen in particular datasets and divergence...

  • Article
  • Open Access
23 Citations
9,195 Views
16 Pages

Interaction Enhanced Imperialist Competitive Algorithms

  • Jun-Lin Lin,
  • Yu-Hsiang Tsai,
  • Chun-Ying Yu and
  • Meng-Shiou Li

15 October 2012

Imperialist Competitive Algorithm (ICA) is a new population-based evolutionary algorithm. It divides its population of solutions into several sub-populations, and then searches for the optimal solution through two operations: assimilation and competi...

  • Article
  • Open Access
5 Citations
7,406 Views
20 Pages

15 October 2012

Forecasting the unit cost of every product type in a factory is an important task. However, it is not easy to deal with the uncertainty of the unit cost. Fuzzy collaborative forecasting is a very effective treatment of the uncertainty in the distribu...

  • Article
  • Open Access
1 Citations
7,577 Views
12 Pages

5 October 2012

We present evidence that one can calculate generically combinatorially expensive Lp and lp averages, 0 < p < 1, in polynomial time by restricting the data to come from a wide class of statistical distributions. Our approach differs from the approache...

  • Article
  • Open Access
15 Citations
8,446 Views
23 Pages

Better Metrics to Automatically Predict the Quality of a Text Summary

  • Peter A. Rankel,
  • John M. Conroy and
  • Judith D. Schlesinger

26 September 2012

In this paper we demonstrate a family of metrics for estimating the quality of a text summary relative to one or more human-generated summaries. The improved metrics are based on features automatically computed from the summaries to measure content a...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Algorithms - ISSN 1999-4893