Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- posterOctober 2023
Poster: Modified Dynamic Beta RED -- A New AQM Algorithm for Internet Congestion Control
IMC '23: Proceedings of the 2023 ACM on Internet Measurement ConferencePages 718–719https://doi.org/10.1145/3618257.3624996In this work we present a performance study of modified Dynamic Beta RED (mDBetaRED), a new Active Queue Management (AQM) RED-type algorithm based on dynamical variants with the ability to adapt to the characteristics of mixed networks. As well, we rely ...
- research-articleJuly 2023
Repetitive Processes and Their Surrogate-Model Congruent Encoding for Evolutionary Algorithms - A Theoretic Proposal
GECCO '23 Companion: Proceedings of the Companion Conference on Genetic and Evolutionary ComputationPages 2289–2296https://doi.org/10.1145/3583133.3596389Evolutionary algorithms are a well-known optimisation technique. They can handle very different optimisation tasks and deal with distorted search spaces as well as non-differentiable optimisation functions. One crucial aspect in the design of ...
- posterJuly 2023
Revealing the Inner Dynamics of Evolutionary Algorithms with Convection Selection
GECCO '23 Companion: Proceedings of the Companion Conference on Genetic and Evolutionary ComputationPages 491–494https://doi.org/10.1145/3583133.3590708Evolutionary algorithms are stochastic algorithms so they tend to find different solutions when run repeatedly. However, it is not just the solutions that vary - the very dynamics of the search that led to finding these solutions are likely to differ ...
- research-articleFebruary 2019
Linear and Efficient String Matching Algorithms Based on Weak Factor Recognition
ACM Journal of Experimental Algorithmics (JEA), Volume 24Article No.: 1.8, Pages 1–20https://doi.org/10.1145/3301295We present a simple and very efficient algorithm for string matching based on the combination of weak factor recognition and hashing. Despite its quadratic worst-case running time, our algorithm exhibits a sublinear behaviour. We also propose some ...
- keynoteApril 2017
Taming the Data Deluge to Unravel the Mysteries of the Universe
WWW '17: Proceedings of the 26th International Conference on World Wide WebPage 1https://doi.org/10.1145/3038912.3050769Modern Astrophysics is one of the most data intensive research fields in the world and is driving many of the required innovations in the "big data" space. Foremost in astronomy in terms of data generation is radio astronomy, and in the last decade an ...
-
- ArticleJune 2012
A multiple sliding windows approach to speed up string matching algorithms
SEA'12: Proceedings of the 11th international conference on Experimental AlgorithmsPages 172–183https://doi.org/10.1007/978-3-642-30850-5_16In this paper we present a general approach to string matching based on multiple sliding text-windows, and show how it can be applied to some among the most efficient algorithms for the problem based on nondeterministic automata and comparison of ...
- ArticleOctober 2011
Improved Compact Routing Scheme with Applications in Static Sensor Networks and Internet
ITHINGSCPSCOM '11: Proceedings of the 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social ComputingPages 201–208https://doi.org/10.1109/iThings/CPSCom.2011.10In this paper, we investigate {a} compact routing scheme with applications in static sensor networks and Internet. More precisely, we propose a new geometric ad-hoc routing algorithm to route queries in static {geometric graphs} in which the number of ...
- research-articleJuly 2010
Finding mobile data under delay constraints with searching costs
PODC '10: Proceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computingPages 297–304https://doi.org/10.1145/1835698.1835774A token is hidden in one of several boxes and then the boxes are locked. The probability of placing the token in each of the boxes is known. A searcher is looking for the token by unlocking boxes where each box is associated with an unlocking cost. The ...
- ArticleJune 2010
Bit-(parallelism)2: getting to the next level of parallelism
We investigate the problem of getting to a higher instruction-level parallelism in string matching algorithms. In particular, starting from an algorithm based on bit-parallelism, we propose two flexible approaches for boosting it with a higher level of ...
- chapterNovember 2009
A New Algorithm for Efficient Pattern Matching with Swaps
The Pattern Matching problem with Swaps consists in finding all occurrences of a pattern P in a text T , when disjoint local swaps in the pattern are allowed.
In this paper, we present a new efficient algorithm for the Swap Matching problem with ...
- ArticleJanuary 2009
Pattern Matching with Swaps for Short Patterns in Linear Time
SOFSEM '09: Proceedings of the 35th Conference on Current Trends in Theory and Practice of Computer SciencePages 255–266https://doi.org/10.1007/978-3-540-95891-8_25The Pattern Matching problem with Swaps consists in finding all occurrences of a pattern <em>P</em> in a text <em>T</em> , when disjoint local swaps in the pattern are allowed. In the Approximate Pattern Matching problem with Swaps one seeks, for every ...
- ArticleSeptember 2008
Computing a longest increasing subsequence of length k in time O(n log log k)
We consider the complexity of computing a longest increasing subsequence parameterised by the length of the output. Namely, we show that the maximal length k of an increasing subsequence of a permutation of the set of integers -1, 2,..., n} can be ...
- articleMarch 2008
On the Algorithmic Aspects of Discrete and Lexicographic Helly-Type Theorems and the Discrete LP-Type Model
Helly's theorem says that, if every $d+1$ elements of a given finite set of convex objects in $\mathbb{R}^d$ have a common point, there is a point common to all of the objects in the set. In discrete Helly theorems the common point should belong to an a ...
- ArticleMarch 2023
Faster Treasure Hunt and Better Strongly Universal Exploration Sequences
AbstractWe study the explicit deterministic treasure hunt problem in an n-vertex network. This problem was firstly introduced by Ta-Shma, and Zwick in [9] [SODA’07]. It is the variant of the well known rendezvous problem in which one of the robot (the ...
- ArticleDecember 2007
Faster treasure hunt and better strongly universal exploration sequences
ISAAC'07: Proceedings of the 18th international conference on Algorithms and computationPages 549–560We study the explicit deterministic treasure hunt problem in an n-vertex network. This problem was firstly introduced by Ta-Shma, and Zwick in [9] [SODA'07]. It is the variant of the well known rendezvous problem in which one of the robot (the treasure) ...
- ArticleJuly 2007
Optimal offline extraction of irredundant motif bases
COCOON'07: Proceedings of the 13th annual international conference on Computing and CombinatoricsPages 360–371The problem of extracting a basis of irredundant motifs from a sequence is considered. In previous work such bases were built incrementally for all suffixes of the input string s in O(n3), where n is the length of s. Faster, non-incremental algorithms ...
- articleMay 2007
An efficient algorithm to solve connectivity problem on trapezoid graphs
Journal of Applied Mathematics and Computing (JAMC), Volume 24, Issue 1Pages 141–154https://doi.org/10.1007/BF02832306The connectivity problem is a fundamental problem in graph theory. The best known algorithm to solve the connectivity problem on general graphs with n vertices and m edges takes O(K(G)mn1.5) time, where K(G) is the vertex connectivity of G. In this ...
- ArticleAugust 2005
A new linearizing restriction in the pattern matching problem
FCT'05: Proceedings of the 15th international conference on Fundamentals of Computation TheoryPages 552–562https://doi.org/10.1007/11537311_48In the pattern matching problem, there can be a quadratic number of matching substrings in the size of a given text. The linearizing restriction finds, at most, a linear number of matching substrings. We first explore two well-known linearizing ...
- ArticleAugust 2005
The delayed k-server problem
FCT'05: Proceedings of the 15th international conference on Fundamentals of Computation TheoryPages 281–292https://doi.org/10.1007/11537311_25We introduce a new version of the server problem: the delayed server problem. In this problem, once a server moves to serve a request, it must wait for one round to move again, but could serve a repeated request to the same point. We show that the ...
- ArticleAugust 2005
A faster and simpler 2-approximation algorithm for block sorting
FCT'05: Proceedings of the 15th international conference on Fundamentals of Computation TheoryPages 115–124https://doi.org/10.1007/11537311_11Block sorting is used in connection with optical character recognition (OCR). Recent work has focused on finding good strategies which perform well in practice. Block sorting is $\mathcal{NP}$-hard and all of the previously known heuristics lack proof ...