Results 31 to 40 of about 23,418,736 (380)
A Multi-Dimensional Matrix Product—A Natural Tool for Parameterized Graph Algorithms
We introduce the concept of a k-dimensional matrix product D of k matrices A1,…,Ak of sizes n1×n,…,nk×n, respectively, where D[i1,…,ik] is equal to ∑ℓ=1nA1[i1,ℓ]×…×Ak[ik,ℓ].
Mirosław Kowaluk, Andrzej Lingas
doaj +1 more source
Some variants of reverse selective center location problem on trees under the Chebyshev and Hamming norms [PDF]
This paper is concerned with two variants of the reverse selective center location problems on tree graphs under the Hamming and Chebyshev cost norms in which the customers are existing on a selective subset of the vertices of the underlying tree.
Etemad Roghayeh, Alizadeh Behrooz
doaj +1 more source
Orthogonal Time Sequency Multiplexing Modulation: Analysis and Low-Complexity Receiver Design [PDF]
This paper proposes orthogonal time sequency multiplexing (OTSM), a novel single carrier modulation scheme that places information symbols in the delay-sequency domain followed by a cascade of time-division multiplexing (TDM) and Walsh-Hadamard sequence ...
Tharaj Thaj, E. Viterbo, Yi Hong
semanticscholar +1 more source
Background As service provision and patient behaviour varies by day, healthcare data used for public health surveillance can exhibit large day of the week effects. These regular effects are further complicated by the impact of public holidays.
Elizabeth Buckingham-Jeffery +5 more
doaj +1 more source
Informer: Beyond Efficient Transformer for Long Sequence Time-Series Forecasting [PDF]
Many real-world applications require the prediction of long sequence time-series, such as electricity consumption planning. Long sequence time-series forecasting (LSTF) demands a high prediction capacity of the model, which is the ability to capture ...
Haoyi Zhou +6 more
semanticscholar +1 more source
Real-time complexity constrained encoding [PDF]
Complex software appliances can be deployed on hardware with limited available computational resources. This computational boundary puts an additional constraint on software applications.
Lambert, Peter +4 more
core +1 more source
Accurate Estimate of the Advantage of Impossible Differential Attacks
Impossible differential attacks, which are taking advantage of differentials that cannot occur, are powerful attacks for block cipher primitives. The power of such attacks is often measured in terms of the advantage — number of key-bits found during the ...
Céline Blondeau
doaj +1 more source
Almost Optimal Searching of Maximal Subrepetitions in a Word
For some fixed δ such that ...
Roman Kolpakov
doaj +1 more source
Detecting Deterministic Chaotic Inter-arrival Times in Material Flow Systems
Automated, modular, asynchronous and locally controlled material flow systems promise high routing flexibility in production lines because their conveying modules can be reconfigured without reprogramming PLCs.
Manns, Martin +3 more
doaj +1 more source
MUSCLE: a multiple sequence alignment method with reduced time and space complexity
BackgroundIn a previous paper, we introduced MUSCLE, a new program for creating multiple alignments of protein sequences, giving a brief summary of the algorithm and showing MUSCLE to achieve the highest scores reported to date on four alignment accuracy
Robert C. Edgar
semanticscholar +1 more source

