Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,530,367 papers from all fields of science
Search
Sign In
Create Free Account
List of algorithms
Known as:
List of database algorithms
, List of distributed systems algorithms
, List of operating systems algorithms
Expand
The following is a list of algorithms along with one-line descriptions for each.
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
AKS primality test
Adaptive histogram equalization
Basis function
Beam stack search
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2007
Highly Cited
2007
Query tree-based reservation for efficient RFID tag anti-collision
J. Choi
,
Dongwook Lee
,
Hyuckjae Lee
IEEE Communications Letters
2007
Corpus ID: 1666293
Since the tree based RFID tag anti-collision protocol achieves 100% read rate, and the slotted ALOHA based tag anti-collision…
Expand
Highly Cited
2007
Highly Cited
2007
Lossless Data Embedding With High Embedding Capacity Based on Declustering for VQ-Compressed Codes
Chinchen Chang
,
Yi-Pei Hsieh
,
Chih-Yang Lin
IEEE Transactions on Information Forensics and…
2007
Corpus ID: 10911761
The purpose of data hiding with reversibility property is to recover the original cover media after extracting the hidden data…
Expand
Highly Cited
2004
Highly Cited
2004
Fast wireless anti-collision algorithm in ubiquitous ID system
Ho-Seung Choi
,
Jae-Ryon Cha
,
Jae-Hyun Kim
IEEE 60th Vehicular Technology Conference, . VTC…
2004
Corpus ID: 6901044
This paper proposes and analyzes the fast wireless anti-collision algorithms (modified bit-by-bit binary-tree algorithm (MBBT…
Expand
Highly Cited
2002
Highly Cited
2002
Automatic Crude Patch Registration: Toward Automatic 3D Model Building
J. V. Wyngaerd
,
L. Gool
Computer Vision and Image Understanding
2002
Corpus ID: 23626794
Three-dimensional shape models are often put together from several partial reconstructions. There are good algorithms available…
Expand
2000
2000
Routing tree construction under fixed buffer locations
J. Cong
,
Xin Yuan
Proceedings - Design Automation Conference
2000
Corpus ID: 29668525
Modern high performance design requires using a large number of buffers. In practice, buffers are organized into buffer blocks…
Expand
2000
2000
Statistically optimized minislot allocation for initial and collision resolution in hybrid fiber coaxial networks
Wei-Ming Yin
,
Ying-Dar Lin
IEEE Journal on Selected Areas in Communications
2000
Corpus ID: 8514497
In a two-way hybrid fiber coaxial (HFC) network, the headend broadcasts in downstream channels, whereas all stations share the…
Expand
Highly Cited
1998
Highly Cited
1998
A Distributed Graph Algorithm for the Detection of Local Cycles and Knots
A. Boukerche
,
C. Tropper
IEEE Trans. Parallel Distributed Syst.
1998
Corpus ID: 5065763
In this paper, a distributed cycle/knot detection algorithm for general graphs is presented. The algorithm distinguishes between…
Expand
Highly Cited
1993
Highly Cited
1993
A direct combination of the Prim and Dijkstra constructions for improved performance-driven global routing
C. Alpert
,
T. C. Hu
,
Dennis J.-H. Huang
,
A. Kahng
IEEE International Symposium on Circuits and…
1993
Corpus ID: 12675986
Motivated by analysis of distributed RC delay in routing trees, a new tree construction is proposed for performance-driven global…
Expand
Highly Cited
1992
Highly Cited
1992
Algorithms for Identifying Relevant Features
H. Almuallim
,
Thomas G. Dietterich
,
Dearborn
,
HallDepartment
1992
Corpus ID: 16073575
This paper describes eecient methods for exact and approximate implementation of the MIN-FEATURES bias, which prefers consistent…
Expand
Highly Cited
1983
Highly Cited
1983
An Algorithm to Compact a VLSI Symbolic Layout with Mixed Constraints
Yuh-Zen Liao
,
Chak-Kuen Wong
IEEE Transactions on Computer-Aided Design of…
1983
Corpus ID: 47450428
A popular algorithm to compact VLSI symbolic layout is to use a graph algorithm similar to finding the "longest path" in a…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE