Results 21 to 30 of about 33,631 (264)
This paper presents a performance comparison of greedy heuristics for a recent variant of the dominating set problem known as the minimum positive influence dominating set (MPIDS) problem. This APX-hard combinatorial optimization problem has applications
Salim Bouamama, Christian Blum
doaj +1 more source
Greedy Palindromic Lengths [PDF]
In [A. Frid, S. Puzynina and L. Q. Zamboni, On palindromic factorization of words, Adv. in Appl. Math. 50 (2013) 737–748], it was conjectured that any infinite word whose palindromic lengths of factors are bounded is ultimately periodic. We introduce variants of this conjecture and prove this conjecture when the bound is 2. Especially we introduce left
Bucci, Michelangelo, Richomme, Gwenaël
openaire +3 more sources
Hyperparameter Optimization Using Successive Halving with Greedy Cross Validation
Training and evaluating the performance of many competing Artificial Intelligence (AI)/Machine Learning (ML) models can be very time-consuming and expensive.
Daniel S. Soper
doaj +1 more source
Weak Greedy Algorithms and the Equivalence Between Semi-greedy and Almost Greedy Markushevich Bases
- The title is updated. - Definition 1.1 is fixed. - Several typos are fixed. - "the weak thresholding set" -> "the only weak thresholding set" (proof of Theorem 4.2). - An inaccuracy after equation (17) is corrected.
Miguel Berasategui, Silvia Lassalle
openaire +4 more sources
Pareto Based Virtual Machine Selection with Load Balancing in Cloud Data Centre
Cloud Data centers have adopted virtualization techniques for effective and efficient compilation of an application. The requirements of application from the execution perspective are fulfilled by scaling up and down the Virtual Machines (VMs).
Naik Ketaki Bhalchandra +2 more
doaj +1 more source
Playing the SOS Game Using Feasible Greedy Strategy
The research aims to make an intelligent agent that can compete against the human player. In this research, the feasible greedy strategy is proposed to make an intelligent agent by checking all possible solutions in the limited tree levels to find ...
Abas Setiawan
doaj +1 more source
Optimal Placement Method of City Surveillance Camera Network Based on Road Coverage [PDF]
City surveillance camera network provides a powerful support for finding criminal suspects and tracing their routes.In order to benefit from the surveillance camera network,and optimize the placement of surveillance camera network to improve efficiency ...
WEI Hao,CHEN Huafeng,CHEN Jun
doaj +1 more source
Scheduling is a systematic method to optimize work time, and avoid failure when problems occur. Scheduling is widely applied in the world of education, one of which is in preparing course schedules.
Alif Nur Fadilah +3 more
doaj +1 more source
Adversarial Attacks Against Binary Similarity Systems
Binary analysis has become essential for software inspection and security assessment. As the number of software-driven devices grows, research is shifting towards autonomous solutions using deep learning models. In this context, a hot topic is the binary
Gianluca Capozzi +3 more
doaj +1 more source
Greedy Texts Similarity Mapping
The documents similarity metric is a substantial tool applied in areas such as determining topic in relation to documents, plagiarism detection, or problems necessary to capture the semantic, syntactic, or structural similarity of texts.
Aliya Jangabylova +3 more
doaj +1 more source

