Results 11 to 20 of about 2,571,172 (193)

EAHUIM: Enhanced Absolute High Utility Itemset Miner for Big Data

open access: yesInternational Journal of Information Management Data Insights, 2022
High utility itemset mining (HUIM) is a data mining technique that identifies the itemsets with utility levels exceeding a pre-determined threshold. The factor utility is described as the combination of magnitude and element of significance for an item ...
Vandna Dahiya, Sandeep Dalal
doaj   +1 more source

Logical consequences. Theory and applications: An introduction. [PDF]

open access: yes, 2020
2nd edition. The theory of logical consequence is central in modern logic and its applications. However, it is mostly dispersed in an abundance of often difficultly accessible papers, and rarely treated with applications in mind.
Augusto, Luis M.
core  

A Joint Multiresponse Split-Plot Modeling and Optimization Including Fixed and Random Effects

open access: yesAustrian Journal of Statistics, 2022
This paper deals with a proposal for joint modeling and process optimization for split-plot designs analyzed through mixed response surface models. It addresses the following main issues: i) the building of a joint mixed response surface model for a ...
Rossella Berni   +1 more
doaj   +3 more sources

Social Intelligence Design in Ambient Intelligence [PDF]

open access: yes, 2009
This Special Issue of AI and Society contains a selection of papers presented at the 6th Social Intelligence Design Workshop held at ITC-irst, Povo (Trento, Italy) in July 2007.
Nijholt, A.   +2 more
core   +3 more sources

A Survey on Quaternion Algebra and Geometric Algebra Applications in Engineering and Computer Science 1995–2020

open access: yesIEEE Access, 2021
Geometric Algebra (GA) has proven to be an advanced language for mathematics, physics, computer science, and engineering. This review presents a comprehensive study of works on Quaternion Algebra and GA applications in computer science and engineering ...
Eduardo Bayro-Corrochano
doaj   +1 more source

A Sound and Complete Axiomatization of Majority-n Logic [PDF]

open access: yes, 2015
Manipulating logic functions via majority operators recently drew the attention of researchers in computer science. For example, circuit optimization based on majority operators enables superior results as compared to traditional logic systems. Also, the
Amaru, Luca   +3 more
core   +2 more sources

Cloud-Assisted Privacy Protection Energy Trading Based on IBS and Homomorphic Encryption in IIoT

open access: yesApplied Sciences, 2022
The decentralized and tamper-proof features of blockchain technology can solve the problems of low compatibility, poor flexibility, and single point of failure in the traditional Industrial Internet of Things (IIoT).
Huajie Wang   +5 more
doaj   +1 more source

Computational Science and its Applications [PDF]

open access: yes, 2010
Computational Science, Geographical Analysis, Urban Modeling, Spatial Statistics, Advanced and Emerging ...
Gervasi,Osvaldo   +3 more
openaire   +7 more sources

Blocked All-Pairs Shortest Paths Algorithm on Intel Xeon Phi KNL Processor: A Case Study

open access: yes, 2018
Manycores are consolidating in HPC community as a way of improving performance while keeping power efficiency. Knights Landing is the recently released second generation of Intel Xeon Phi architecture.
A Nakaya   +8 more
core   +1 more source

Four lectures on probabilistic methods for data science

open access: yes, 2016
Methods of high-dimensional probability play a central role in applications for statistics, signal processing theoretical computer science and related fields.
Vershynin, Roman
core   +1 more source

Home - About - Disclaimer - Privacy