Results 31 to 40 of about 305,625 (281)

Weak Greedy Algorithms and the Equivalence Between Semi-greedy and Almost Greedy Markushevich Bases

open access: yesJournal of Fourier Analysis and Applications, 2023
- The title is updated. - Definition 1.1 is fixed. - Several typos are fixed. - "the weak thresholding set" -> "the only weak thresholding set" (proof of Theorem 4.2). - An inaccuracy after equation (17) is corrected.
Miguel Berasategui, Silvia Lassalle
openaire   +4 more sources

Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces [PDF]

open access: yes, 2009
We show that complex (scale-free) network topologies naturally emerge from hyperbolic metric spaces. Hyperbolic geometry facilitates maximally efficient greedy forwarding in these networks. Greedy forwarding is topology-oblivious.
Boguna, Marian   +3 more
core   +4 more sources

Pareto Based Virtual Machine Selection with Load Balancing in Cloud Data Centre

open access: yesCybernetics and Information Technologies, 2018
Cloud Data centers have adopted virtualization techniques for effective and efficient compilation of an application. The requirements of application from the execution perspective are fulfilled by scaling up and down the Virtual Machines (VMs).
Naik Ketaki Bhalchandra   +2 more
doaj   +1 more source

Playing the SOS Game Using Feasible Greedy Strategy

open access: yesCommIT Journal, 2020
The research aims to make an intelligent agent that can compete against the human player. In this research, the feasible greedy strategy is proposed to make an intelligent agent by checking all possible solutions in the limited tree levels to find ...
Abas Setiawan
doaj   +1 more source

Optimal Placement Method of City Surveillance Camera Network Based on Road Coverage [PDF]

open access: yesJisuanji gongcheng, 2016
City surveillance camera network provides a powerful support for finding criminal suspects and tracing their routes.In order to benefit from the surveillance camera network,and optimize the placement of surveillance camera network to improve efficiency ...
WEI Hao,CHEN Huafeng,CHEN Jun
doaj   +1 more source

Self-Dictionary Sparse Regression for Hyperspectral Unmixing: Greedy Pursuit and Pure Pixel Search are Related [PDF]

open access: yes, 2015
This paper considers a recently emerged hyperspectral unmixing formulation based on sparse regression of a self-dictionary multiple measurement vector (SD-MMV) model, wherein the measured hyperspectral pixels are used as the dictionary.
Bioucas-Dias, José M.   +3 more
core   +2 more sources

A Comparison of Welch Powell Algorithm and Greedy Algorithm in Odd Semester Lecture Room Scheduling Optimization Faculty of Computer Science

open access: yesJTAM (Jurnal Teori dan Aplikasi Matematika)
Scheduling is a systematic method to optimize work time, and avoid failure when problems occur. Scheduling is widely applied in the world of education, one of which is in preparing course schedules.
Alif Nur Fadilah   +3 more
doaj   +1 more source

Adversarial Attacks Against Binary Similarity Systems

open access: yesIEEE Access
Binary analysis has become essential for software inspection and security assessment. As the number of software-driven devices grows, research is shifting towards autonomous solutions using deep learning models. In this context, a hot topic is the binary
Gianluca Capozzi   +3 more
doaj   +1 more source

Greedy Texts Similarity Mapping

open access: yesComputation, 2022
The documents similarity metric is a substantial tool applied in areas such as determining topic in relation to documents, plagiarism detection, or problems necessary to capture the semantic, syntactic, or structural similarity of texts.
Aliya Jangabylova   +3 more
doaj   +1 more source

Non-equivalent greedy and almost greedy bases in lp

open access: yesJournal of Function Spaces and Applications, 2006
For 1 < p < 8 and p ? 2 we construct a family of mutually non-equivalent greedy bases in lp having the cardinality of the continuum. In fact, no basis from this family is equivalent to a rearranged subsequence of any other basis thereof.
Stephen J. Dilworth   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy