Results 11 to 20 of about 1,192,191 (268)

Lazy AC-Pattern Matching for Rewriting [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2012
We define a lazy pattern-matching mechanism modulo associativity and commutativity. The solutions of a pattern-matching problem are stored in a lazy list composed of a first substitution at the head and a non-evaluated object that encodes the remaining ...
Walid Belkhir, Alain Giorgetti
doaj   +1 more source

Fast Algorithms for Computing the Statistics of Pattern Matching

open access: yesIEEE Access, 2021
Pattern matching is a fundamental problem in theoretical computer science. The algorithms for pattern matching and the study on the statistics of pattern matching have found enormous applications in practical fields.
Danna Zhang, Kai Jin
doaj   +1 more source

Spintronic In-Memory Pattern Matching

open access: yesIEEE Journal on Exploratory Solid-State Computational Devices and Circuits, 2019
Traditional Von Neumann computing is falling apart in the era of exploding data volumes as the overhead of data transfer becomes forbidding. Instead, it is more energy-efficient to fuse compute capability with memory where the data reside.
Zamshed I. Chowdhury   +8 more
doaj   +1 more source

Research on Uyghur Pattern Matching Based on Syllable Features

open access: yesInformation, 2020
Pattern matching is widely used in various fields such as information retrieval, natural language processing (NLP), data mining and network security. In Uyghur (a typical agglutinative, low-resource language with complex morphology, spoken by the ethnic ...
Wayit Abliz   +6 more
doaj   +1 more source

Pattern matching and pattern discovery algorithms for protein topologies [PDF]

open access: yes, 2001
We describe algorithms for pattern matching and pattern learning in TOPS diagrams (formal descriptions of protein topologies). These problems can be reduced to checking for subgraph isomorphism and finding maximal common subgraphs in a restricted ...
C. Bron   +14 more
core   +1 more source

Diversified Top-k Graph Pattern Matching [PDF]

open access: yes, 2013
Graph pattern matching has been widely used in e.g., social data analysis. A number of matching algorithms have been developed that, given a graph pattern Q and a graph G , compute the set
Fan, Wenfei, Wang, Xin, Wu, Yinghui
core   +1 more source

Defending against social engineering attacks: A security pattern‐based analysis framework

open access: yesIET Information Security, 2023
Social engineering attacks are a growing threat to modern complex systems. Increasingly, attackers are exploiting people's "vulnerabilities" to carry out social engineering attacks for malicious purposes.
Tong Li, Chuanyong Song, Qinyu Pang
doaj   +1 more source

On the Expressiveness of Intensional Communication [PDF]

open access: yes, 2014
The expressiveness of communication primitives has been explored in a common framework based on the pi-calculus by considering four features: synchronism (asynchronous vs synchronous), arity (monadic vs polyadic data), communication medium (shared ...
Given-Wilson, Thomas
core   +6 more sources

Local Feature Descriptor for Image Matching: A Survey

open access: yesIEEE Access, 2019
Image registration is an important technique in many computer vision applications such as image fusion, image retrieval, object tracking, face recognition, change detection and so on.
Chengcai Leng   +5 more
doaj   +1 more source

Energy efficient IPC based dual compression for endurance enhancement of NVRAM as main memory in embedded devices

open access: yesIET Communications, 2023
The Non‐Volatile Random Access Memory (NVRAM) is recently identified as the most upcoming main memory technology in Embedded and Internet of Things (IoT) systems due to its appealing qualities like zero static power consumption and great memory cell ...
Shritharanyaa Jothimani Palanivelu   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy