Results 31 to 40 of about 305,625 (281)
Weak Greedy Algorithms and the Equivalence Between Semi-greedy and Almost Greedy Markushevich Bases
- The title is updated. - Definition 1.1 is fixed. - Several typos are fixed. - "the weak thresholding set" -> "the only weak thresholding set" (proof of Theorem 4.2). - An inaccuracy after equation (17) is corrected.
Miguel Berasategui, Silvia Lassalle
openaire +4 more sources
Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces [PDF]
We show that complex (scale-free) network topologies naturally emerge from hyperbolic metric spaces. Hyperbolic geometry facilitates maximally efficient greedy forwarding in these networks. Greedy forwarding is topology-oblivious.
Boguna, Marian +3 more
core +4 more sources
Pareto Based Virtual Machine Selection with Load Balancing in Cloud Data Centre
Cloud Data centers have adopted virtualization techniques for effective and efficient compilation of an application. The requirements of application from the execution perspective are fulfilled by scaling up and down the Virtual Machines (VMs).
Naik Ketaki Bhalchandra +2 more
doaj +1 more source
Playing the SOS Game Using Feasible Greedy Strategy
The research aims to make an intelligent agent that can compete against the human player. In this research, the feasible greedy strategy is proposed to make an intelligent agent by checking all possible solutions in the limited tree levels to find ...
Abas Setiawan
doaj +1 more source
Optimal Placement Method of City Surveillance Camera Network Based on Road Coverage [PDF]
City surveillance camera network provides a powerful support for finding criminal suspects and tracing their routes.In order to benefit from the surveillance camera network,and optimize the placement of surveillance camera network to improve efficiency ...
WEI Hao,CHEN Huafeng,CHEN Jun
doaj +1 more source
Self-Dictionary Sparse Regression for Hyperspectral Unmixing: Greedy Pursuit and Pure Pixel Search are Related [PDF]
This paper considers a recently emerged hyperspectral unmixing formulation based on sparse regression of a self-dictionary multiple measurement vector (SD-MMV) model, wherein the measured hyperspectral pixels are used as the dictionary.
Bioucas-Dias, José M. +3 more
core +2 more sources
Scheduling is a systematic method to optimize work time, and avoid failure when problems occur. Scheduling is widely applied in the world of education, one of which is in preparing course schedules.
Alif Nur Fadilah +3 more
doaj +1 more source
Adversarial Attacks Against Binary Similarity Systems
Binary analysis has become essential for software inspection and security assessment. As the number of software-driven devices grows, research is shifting towards autonomous solutions using deep learning models. In this context, a hot topic is the binary
Gianluca Capozzi +3 more
doaj +1 more source
Greedy Texts Similarity Mapping
The documents similarity metric is a substantial tool applied in areas such as determining topic in relation to documents, plagiarism detection, or problems necessary to capture the semantic, syntactic, or structural similarity of texts.
Aliya Jangabylova +3 more
doaj +1 more source
Non-equivalent greedy and almost greedy bases in lp
For 1 < p < 8 and p ? 2 we construct a family of mutually non-equivalent greedy bases in lp having the cardinality of the continuum. In fact, no basis from this family is equivalent to a rearranged subsequence of any other basis thereof.
Stephen J. Dilworth +2 more
doaj +1 more source

