Results 31 to 40 of about 921,934 (330)

Improved Output-Sensitive Quantum Algorithms for Boolean Matrix Multiplication [PDF]

open access: yesProceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms, 2012
F. Gall
openaire   +2 more sources

Research on Differential Privacy Protection for Collaborative Vehicle-Road Inference [PDF]

open access: yesJisuanji gongcheng, 2022
Collaborative vehicle-road inference performs deep convolutional network inference operations by combining vehicular terminals and roadside edge servers.Although this process improves inference efficiency, it creates the issue of user privacy leaks ...
WU Maoqiang, HUANG Xumin, KANG Jiawen, YU Rong
doaj   +1 more source

Distributed H∞ Method Design and Operation using Dis- tributed Computing [PDF]

open access: yesITM Web of Conferences, 2023
Control systems have two significant components: controllers and filters. Controllers are used to control the output while filters are used to estimate the internal state of a system from a series of noisy output measurements.
Shaheer Sanaul, P.B Jayaraj
doaj   +1 more source

Output Sensitive Algorithms for Approximate Incidences and Their Applications [PDF]

open access: yesEmbedded Systems and Applications, 2020
An e-approximate incidence between a point and some geometric object (line, circle, plane, sphere) occurs when the point and the object lie at distance at most e from each other.
Dror Aiger, Haim Kaplan, M. Sharir
semanticscholar   +1 more source

Towards Optimal Output-Sensitive Clique Listing or: Listing Cliques from Smaller Cliques [PDF]

open access: yesSymposium on the Theory of Computing, 2023
We study the problem of finding and listing k-cliques in an m-edge, n-vertex graph, for constant k≥ 3. This is a fundamental problem of both theoretical and practical importance.
Mina Dalirrooyfard   +3 more
semanticscholar   +1 more source

Efficient Parallel Output-Sensitive Edit Distance [PDF]

open access: yesEmbedded Systems and Applications, 2023
Given two strings $A[1..n]$ and $B[1..m]$, and a set of operations allowed to edit the strings, the edit distance between $A$ and $B$ is the minimum number of operations required to transform $A$ into $B$. Sequentially, a standard Dynamic Programming (DP)
Xiangyun Ding   +4 more
semanticscholar   +1 more source

Power Plant Energy Predictions Based on Thermal Factors Using Ridge and Support Vector Regressor Algorithms

open access: yesEnergies, 2021
This work aims to model the combined cycle power plant (CCPP) using different algorithms. The algorithms used are Ridge, Linear regressor (LR), and upport vector regressor (SVR).
Asif Afzal   +4 more
doaj   +1 more source

Robust Non-Linear Controller Design for DC-DC Buck Converter via Modified Back-Stepping Methodology

open access: yesElektronika ir Elektrotechnika, 2022
This paper introduces two improved control algorithms for DC-DC converters. The first one is called “Non-Adaptive Modified Back-Stepping Control” (M-BSC) and the second one is called “Adaptive Modified Back-Stepping Control” (AM-BSC).
Okba Boutebba   +5 more
doaj   +1 more source

Distribution-sensitive set multi-partitioning [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2005
Given a set $\mathcal{S}$ with real-valued members, associated with each member one of two possible types; a multi-partitioning of $\mathcal{S}$ is a sequence of the members of $\mathcal{S}$ such that if $x,y \in \mathcal{S}$ have different types and $x <
Amr Elmasry
doaj   +1 more source

AGIM-net based subject-sensitive hashing algorithm for integrity authentication of HRRS images

open access: yesGeocarto International, 2023
The premise of effective use of high-resolution remote sensing (HRRS) images is that the data integrity and authenticity of HRRS images must be guaranteed.
Kaimeng Ding   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy