Results 51 to 60 of about 335,663 (179)

Research of embedding algorithm for wireless network virtualization

open access: yesTongxin xuebao, 2017
Wireless network virtualization has become one of the promising techniques in fifth generation mobile networks (5G),and the virtual network embedding plays a very important role.A model was formulated to describe the problem and a wireless virtual ...
Bin CAO, Shi-chao XIA, Fang HE, Yun LI
doaj  

SpecRp: A spectral-based community embedding algorithm

open access: yesMachine Learning with Applications, 2022
Community embeddings are useful in node classification since they allow nodes to aggregate relevant information regarding the network structure. Modularity maximization-based algorithms are the most common approach to detect communities in networks ...
Camila P.S. Tautenhain   +1 more
doaj   +1 more source

Computing fundamental domains for the Bruhat-Tits tree for GL2(Qp), p-adic automorphic forms, and the canonical embedding of Shimura curves

open access: yes, 2014
We describe an algorithm for computing certain quaternionic quotients of the Bruhat-Tits tree for GL2(Qp). As an application, we describe an algorithm to obtain (conjectural) equations for the canonical embedding of Shimura curves.Comment: Accepted for ...
Boutot   +4 more
core   +1 more source

A near-optimal approximation algorithm for Asymmetric TSP on embedded graphs

open access: yes, 2013
We present a near-optimal polynomial-time approximation algorithm for the asymmetric traveling salesman problem for graphs of bounded orientable or non-orientable genus.
Erickson, Jeff, Sidiropoulos, Anastasios
core   +1 more source

High capacity reversible hiding in encrypted domain based on cipher-feedback secret sharing

open access: yesTongxin xuebao, 2023
To improve the security, robustness and embedding rate of reversible hiding in encrypted domain in the distributed environment, a multiple embedding algorithm based on cipher-feedback secret sharing was proposed.Firstly, the additional data were embedded
Minqing ZHANG   +4 more
doaj   +2 more sources

Reversible Information Hiding Algorithm in Encrypted Domain Based on Difference Histogram Shifting [PDF]

open access: yesJisuanji gongcheng, 2019
The embedding capacity of the current difference histogram shifting algorithm is low.To cope with this problem,we propose a large-capacity reversible data hiding algorithm in encrypted domain.First,we use the single homomorphic encryption to enable a ...
LI Zhijia, XIA Wei
doaj   +1 more source

Optimal embedding parameters: A modelling paradigm

open access: yes, 2003
Reconstruction of a dynamical system from a time series requires the selection of two parameters, the embedding dimension $d_e$ and the embedding lag $\tau$. Many competing criteria to select these parameters exist, and all are heuristic.
C.K. Tse   +16 more
core   +1 more source

An Exact Algorithm for Minimum Distortion Embedding [PDF]

open access: yesTheoretical Computer Science, 2010
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Fomin, Fedor V.   +2 more
openaire   +1 more source

Adaptive JPEG steganography based on distortion cost updating

open access: yesTongxin xuebao, 2017
Previous adaptive JPEG steganography algorithms mostly calculate image distortion before secret information embedding,so they can’t dynamically adjust distortion costs.Considering the mutual impacts during embedding,an adaptive JPEG steganography ...
Guang-ming TANG   +3 more
doaj   +2 more sources

Errors in graph embedding algorithms

open access: yesJournal of Computer and System Sciences, 2011
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Myrvold, Wendy, Kocay, William
openaire   +2 more sources

Home - About - Disclaimer - Privacy