Results 241 to 250 of about 149,503 (282)
Some of the next articles are maybe not open access.

A novel jamming strategy-greedy bandit

2017 IEEE 9th International Conference on Communication Software and Networks (ICCSN), 2017
In an electronic warfare-type scenario, an optimal jamming strategy is vital important for a jammer who has restricted power and how to make the optimal strategies quickly and accurately put on the agenda. In this paper, we developed a cognitive jammer who could learn the optimal jamming strategies with the proposed algorithm-Greedy Bandits (GB).
Shaoshuai ZhuanSun   +3 more
openaire   +1 more source

GRAPE, a greedy accumulated strategy for computational protein engineering

2021
Nature harbors fascinating enzymatic catalysts with high efficiency, chemo-, regio- and stereoselectivity. However, the insufficient stability of the enzymes often prevents their widespread utilization for industrial processes. Not content with the finite repertoire of naturally occurring enzymes, protein engineering holds promises to extend the ...
Jinyuan, Sun, Yinglu, Cui, Bian, Wu
openaire   +2 more sources

Greedy partitioning strategy for banyan-hypercube networks

[1991] Proceedings. The Fifth International Parallel Processing Symposium, 2002
The authors have developed a partitioning strategy (FP) for banyan-hypercubes (BHs) networks, similar to the best fit strategy of memory allocation. They design and study a greedy partitioning (GP) strategy for BHs which to some extent resembles the first fit strategy of memory allocation. They simulated both FP and GP strategies.
A. Bellaachia, A. Youssef
openaire   +1 more source

Dynamic Relay Selection using a Greedy Cluster Strategy

2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), 2020
One of the primary challenges of relay assisted communications in ad hoc network and device-to-device (D2D) communications in cellular network is sustenance of QoS requirements of mobile users. This paper proposes a relay selection technique based on a greedy clustering scheme that takes relay load and willingness into consideration during relay ...
Raja Mukhopadhyay   +2 more
openaire   +1 more source

Strategy for Accelerating Multiway Greedy Compressive Sensing Reconstruction

IEEE Signal Processing Letters, 2019
The multiway greedy algorithm is widely used for reconstructions of Tucker-decomposition-based compressive sensing. However, its practicability is limited by the fact that only one support can be updated in most iterations, which increases the required number of iterations and influences the reconstruction speed. To address this problem, in this letter,
Rongqiang Zhao   +3 more
openaire   +1 more source

Evaluation of the Greedy Recovery Strategy in VANETs

2014 International Conference on Computational Intelligence and Communication Networks, 2014
Routing in Vehicular Ad hoc Network (VANET) plays a vital role data dissemination. Proactive and reactive routing of Mobile ad hoc networks (MANET) does not suit VANET owing to higher mobility. Hence researchers have proposed geographic routing protocols which are location based. They do not depend on routing tables as in MANET. These routing protocols
Nithya P.S. Darisini, N. Santhiya Kumari
openaire   +1 more source

DSP Memory Allocation Strategy Based on Greedy Algorithm

Advanced Materials Research, 2014
In practical applications of DSP systems, DSP chips with limited on-chip RAM resources are often chosen to reduce cost. In this condition, part of the codes has to be stored in FLASH or expanded RAM and thus can not run at full speed. This paper presents a strategy of allocating the on-chip RAMs to obtain the maximum system performance.
Yan Hong Fan   +5 more
openaire   +1 more source

Greedy immunization strategy in weighted scale-free networks

Engineering Computations, 2014
Purpose – The purpose of this paper is to present a new immunization strategy for effectively solving the control of the spread of the virus. Design/methodology/approach – Inspired by the idea of network partition, taking two optimization targets which are the ...
Zhang-Hui Liu   +3 more
openaire   +1 more source

An Optimal Web Services Integration Using Greedy Strategy

2008 IEEE Asia-Pacific Services Computing Conference, 2008
Due to the fast advancement of network technologies, the study of service-oriented architectures (SOA) has attracted much attention recently, taking advantage of the benefits of distributed computing and integration. Web service is a very popular and widely accepted implementation of SOA.
Wen Ouyang, Min-Lang Chen
openaire   +1 more source

A Greedy Strategy Link Clustering Method Based on AP

2015 Second European Network Intelligence Conference, 2015
With the emergence of link clustering method (LC), research on link community detection has become an important topic in the overlapping community detection. After calculation of link similarity, LC method divides the community through hierarchical clustering and partition density method.
Liming Song   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy