Results 21 to 30 of about 33,631 (264)

An Improved Greedy Heuristic for the Minimum Positive Influence Dominating Set Problem in Social Networks

open access: yesAlgorithms, 2021
This paper presents a performance comparison of greedy heuristics for a recent variant of the dominating set problem known as the minimum positive influence dominating set (MPIDS) problem. This APX-hard combinatorial optimization problem has applications
Salim Bouamama, Christian Blum
doaj   +1 more source

Greedy Palindromic Lengths [PDF]

open access: yesInternational Journal of Foundations of Computer Science, 2018
In [A. Frid, S. Puzynina and L. Q. Zamboni, On palindromic factorization of words, Adv. in Appl. Math. 50 (2013) 737–748], it was conjectured that any infinite word whose palindromic lengths of factors are bounded is ultimately periodic. We introduce variants of this conjecture and prove this conjecture when the bound is 2. Especially we introduce left
Bucci, Michelangelo, Richomme, Gwenaël
openaire   +3 more sources

Hyperparameter Optimization Using Successive Halving with Greedy Cross Validation

open access: yesAlgorithms, 2022
Training and evaluating the performance of many competing Artificial Intelligence (AI)/Machine Learning (ML) models can be very time-consuming and expensive.
Daniel S. Soper
doaj   +1 more source

Weak Greedy Algorithms and the Equivalence Between Semi-greedy and Almost Greedy Markushevich Bases

open access: yesJournal of Fourier Analysis and Applications, 2023
- The title is updated. - Definition 1.1 is fixed. - Several typos are fixed. - "the weak thresholding set" -> "the only weak thresholding set" (proof of Theorem 4.2). - An inaccuracy after equation (17) is corrected.
Miguel Berasategui, Silvia Lassalle
openaire   +4 more sources

Pareto Based Virtual Machine Selection with Load Balancing in Cloud Data Centre

open access: yesCybernetics and Information Technologies, 2018
Cloud Data centers have adopted virtualization techniques for effective and efficient compilation of an application. The requirements of application from the execution perspective are fulfilled by scaling up and down the Virtual Machines (VMs).
Naik Ketaki Bhalchandra   +2 more
doaj   +1 more source

Playing the SOS Game Using Feasible Greedy Strategy

open access: yesCommIT Journal, 2020
The research aims to make an intelligent agent that can compete against the human player. In this research, the feasible greedy strategy is proposed to make an intelligent agent by checking all possible solutions in the limited tree levels to find ...
Abas Setiawan
doaj   +1 more source

Optimal Placement Method of City Surveillance Camera Network Based on Road Coverage [PDF]

open access: yesJisuanji gongcheng, 2016
City surveillance camera network provides a powerful support for finding criminal suspects and tracing their routes.In order to benefit from the surveillance camera network,and optimize the placement of surveillance camera network to improve efficiency ...
WEI Hao,CHEN Huafeng,CHEN Jun
doaj   +1 more source

A Comparison of Welch Powell Algorithm and Greedy Algorithm in Odd Semester Lecture Room Scheduling Optimization Faculty of Computer Science

open access: yesJTAM (Jurnal Teori dan Aplikasi Matematika)
Scheduling is a systematic method to optimize work time, and avoid failure when problems occur. Scheduling is widely applied in the world of education, one of which is in preparing course schedules.
Alif Nur Fadilah   +3 more
doaj   +1 more source

Adversarial Attacks Against Binary Similarity Systems

open access: yesIEEE Access
Binary analysis has become essential for software inspection and security assessment. As the number of software-driven devices grows, research is shifting towards autonomous solutions using deep learning models. In this context, a hot topic is the binary
Gianluca Capozzi   +3 more
doaj   +1 more source

Greedy Texts Similarity Mapping

open access: yesComputation, 2022
The documents similarity metric is a substantial tool applied in areas such as determining topic in relation to documents, plagiarism detection, or problems necessary to capture the semantic, syntactic, or structural similarity of texts.
Aliya Jangabylova   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy