Search

Showing total 423 results

Search Constraints

Start Over You searched for: Topic algorithms Remove constraint Topic: algorithms Journal computer journal Remove constraint Journal: computer journal Publisher oxford university press / usa Remove constraint Publisher: oxford university press / usa
423 results

Search Results

1. Locating Maximal Multirepeats in Multiple Strings Under Various Constraints†A preliminary version of the results of this paper was presented in CPM 2002.

2. Efficient Parameter Server Placement for Distributed Deep Learning in Edge Computing.

3. EmailDetective: An Email Authorship Identification And Verification Model.

4. Efficient Algorithms For Storage Load Balancing Of Outsourced Data In Blockchain Network.

5. A Self-Stabilizing Distributed Algorithm for the Generalized Dominating Set Problem With Safe Convergence.

6. Smart Multimedia Compressor—Intelligent Algorithms for Text and Image Compression.

7. Algorithm to Construct Completely Independent Spanning Trees in Line Graphs.

8. Improved Collision Detection Of MD5 Using Sufficient Condition Combination.

9. Human Activity Recognition Based On Video Summarization And Deep Convolutional Neural Network.

10. Privacy-Preserving Breast Cancer Prediction Based on Logistic Regression.

11. Hardware Addition Over Finite Fields Based On Booth–Karatsuba Algorithm.

12. Service Function Placement Optimization For Cloud Service With End-to-End Delay Constraints.

13. An Improved Density Peaks Clustering Algorithm Based On Density Ratio.

14. MBSO Algorithm For Handling Energy-Throughput Trade-Off In Cognitive Radio Networks.

15. Hidden Markov Model-based Load Balancing in Data Center Networks.

16. Quantum Attacks on 1K-AES and PRINCE.

17. sasa: a SimulAtor of Self-stabilizing Algorithms.

18. A New Approach for Resource Recommendation in the Fog-Based IoT Using a Hybrid Algorithm.

19. A Hybrid Strategy Improved Whale Optimization Algorithm for Web Service Composition.

20. Trust-aware Task Allocation in Collaborative Crowdsourcing Model.

21. Optimal Text Document Clustering Enabled by Weighed Similarity Oriented Jaya With Grey Wolf Optimization Algorithm.

22. Specifying and Model Checking Distributed Control Algorithms at Meta-level.

23. Watson–Crick Context-Free Grammars: Grammar Simplifications and a Parsing Algorithm.

24. Difference-Comparison-based Malicious Meter Inspection in Neighborhood Area Networks in Smart Grid.

25. Improved Meet-in-the-Middle Attacks on Reduced-Round Tweakable Block Cipher Deoxys-BC.

26. New Code-Based Blind Signature Scheme.

27. Byte2vec: Malware Representation and Feature Selection for Android.

28. Algorithms Based on Path Contraction Carrying Weights for Enumerating Subtrees of Tricyclic Graphs.

29. Energy-Efficient Step-Counting Algorithm for Smartphones.

30. Genetically Based Combination of Visual Saliency and Roughness for FR 3D Mesh Quality Assessment: A Statistical Study.

31. SIFT-Based Visual Tracking using Optical Flow and Belief Propagation Algorithm.

32. Energy-Aware Routing in Software-Defined Network using Compression.

33. From Consensus to Atomic Broadcast: Time-Free Byzantine-Resistant Protocols without Signatures.

34. Improving Human Action Recognition Using Hierarchical Features And Multiple Classifier Ensembles.

35. Optimal Feature Selection and Hybrid Classification for Autism Detection in Young Children.

36. LUISA: Decoupling the Frequency Model From the Context Model in Prediction-Based Compression.

37. A New Intrusion Detection System Using the Improved Dendritic Cell Algorithm.

38. Precise Point Set Registration Based on Feature Fusion.

39. One-to-Many Node-Disjoint Paths Routing in Dense Gaussian Networks.

40. An Efficient Skip-Search Approach to Swap Matching.

41. Hierarchical Approach to Detect Fractures in CT DICOM Images.

42. A True-Concurrency Encoding for BMC of Compositional Systems.

43. A proposed framework for cloud-aware multimodal multimedia big data analysis toward optimal resource allocation.

44. CMT: An Efficient Algorithm for Scalable Packet Classification.

45. Covering Array Constructors: An Experimental Analysis of Their Interaction Coverage and Fault Detection.

46. Performance Analysis of Prioritization and Contention Control Algorithm in Wireless Body Area Networks.

47. A Guess-And-Determine Attack On SNOW-V Stream Cipher.

48. The Construction of a Majority-Voting Ensemble Based on the Interrelation and Amount of Information of Features.

49. Detection of splicing forgery using differential evolution and wavelet decomposition.

50. Driving Route Recommendation With Profit Maximization in Ride Sharing.