Graph processing algorithms are key in many emerging applications in areas such as machine learning and data analytics. Although the processing of large scale graphs exhibits a high degree of parallelism, the memory access pattern tend to be highly i...
Document(s)
Title
The barycenter graph has been shown as an alternative to obtain the representative of a given set of graphs. In this paper we propose an extension of the original algorithm which makes use of the graph edit distance in conjunction with the weighted m...
The vignette effect (radial fall-off) is commonly encountered in images obtained through certain image acquisition setups and can seriously hinder automatic analysis processes. In this paper we present a fast and efficient method for dealing with vig...
Purpose: Life cycle assessment (LCA) methodology is a well-established analytical method to quantify environmental impacts, which has been mainly applied to products. However, recent literature would suggest that it has also the potential as an analy...
In this paper, we propose an auction based cooperative sensing protocol for secondary users in cognitive networks. The proposed auction mechanism is based on a novel modified Vickrey auction with a three dimensional bidding, that accounts for detecti...
We show that the behavior of T700/M21s and T800/M21s composite panels are affected by the influence of strain rates together with local shear and crush punch or global flexural strengths of the structure. A deterministic continuous composite material...
We show that the behavior of T700/M21s and T800/M21s composite panels are affected by the influence of strain rates together with local shear and crush punch or global flexural strengths of the structure.A deterministic continuous composite material ...
Peer reviewed
Peer reviewed
The rapid growth of Internet malicious activities has become a major concern to network forensics and security community. With the increasing use of IT technologies for managing information there is a need for stronger intrusion detection mechanisms....