Results 11 to 20 of about 2,571,172 (193)
EAHUIM: Enhanced Absolute High Utility Itemset Miner for Big Data
High utility itemset mining (HUIM) is a data mining technique that identifies the itemsets with utility levels exceeding a pre-determined threshold. The factor utility is described as the combination of magnitude and element of significance for an item ...
Vandna Dahiya, Sandeep Dalal
doaj +1 more source
Logical consequences. Theory and applications: An introduction. [PDF]
2nd edition. The theory of logical consequence is central in modern logic and its applications. However, it is mostly dispersed in an abundance of often difficultly accessible papers, and rarely treated with applications in mind.
Augusto, Luis M.
core
A Joint Multiresponse Split-Plot Modeling and Optimization Including Fixed and Random Effects
This paper deals with a proposal for joint modeling and process optimization for split-plot designs analyzed through mixed response surface models. It addresses the following main issues: i) the building of a joint mixed response surface model for a ...
Rossella Berni +1 more
doaj +3 more sources
Social Intelligence Design in Ambient Intelligence [PDF]
This Special Issue of AI and Society contains a selection of papers presented at the 6th Social Intelligence Design Workshop held at ITC-irst, Povo (Trento, Italy) in July 2007.
Nijholt, A. +2 more
core +3 more sources
Geometric Algebra (GA) has proven to be an advanced language for mathematics, physics, computer science, and engineering. This review presents a comprehensive study of works on Quaternion Algebra and GA applications in computer science and engineering ...
Eduardo Bayro-Corrochano
doaj +1 more source
A Sound and Complete Axiomatization of Majority-n Logic [PDF]
Manipulating logic functions via majority operators recently drew the attention of researchers in computer science. For example, circuit optimization based on majority operators enables superior results as compared to traditional logic systems. Also, the
Amaru, Luca +3 more
core +2 more sources
Cloud-Assisted Privacy Protection Energy Trading Based on IBS and Homomorphic Encryption in IIoT
The decentralized and tamper-proof features of blockchain technology can solve the problems of low compatibility, poor flexibility, and single point of failure in the traditional Industrial Internet of Things (IIoT).
Huajie Wang +5 more
doaj +1 more source
Computational Science and its Applications [PDF]
Computational Science, Geographical Analysis, Urban Modeling, Spatial Statistics, Advanced and Emerging ...
Gervasi,Osvaldo +3 more
openaire +7 more sources
Blocked All-Pairs Shortest Paths Algorithm on Intel Xeon Phi KNL Processor: A Case Study
Manycores are consolidating in HPC community as a way of improving performance while keeping power efficiency. Knights Landing is the recently released second generation of Intel Xeon Phi architecture.
A Nakaya +8 more
core +1 more source
Four lectures on probabilistic methods for data science
Methods of high-dimensional probability play a central role in applications for statistics, signal processing theoretical computer science and related fields.
Vershynin, Roman
core +1 more source

