Search

Showing total 444 results

Search Constraints

Start Over You searched for: Search Limiters Full Text Remove constraint Search Limiters: Full Text Topic algorithms Remove constraint Topic: algorithms Topic computer science Remove constraint Topic: computer science
444 results

Search Results

1. Resolution of the Burrows-Wheeler Transform Conjecture.

2. Design of New Word Retrieval Algorithm for Chinese-English Bilingual Parallel Corpus.

3. Comparison of Algorithms for the AI-Based Fault Diagnostic of Cable Joints in MV Networks.

4. Speed Proportional Integrative Derivative Controller: Optimization Functions in Metaheuristic Algorithms.

5. Ten Simple Rules for Writing Research Papers.

6. Reed–Muller Codes: Theory and Algorithms.

7. Symmetric Cryptography on RISC-V: Performance Evaluation of Standardized Algorithms.

8. Single Image Super-Resolution Quality Assessment: A Real-World Dataset, Subjective Studies, and an Objective Metric.

9. Index-Based Solutions for Efficient Density Peak Clustering.

10. Near-Optimal Sparsity-Constrained Group Testing: Improved Bounds and Algorithms.

11. A Hierarchical Universal Algorithm for Geometric Objects' Reflection Symmetry Detection.

12. GFocus: User Focus-Based Graph Query Autocompletion.

13. Cube query interestingness: Novelty, relevance, peculiarity and surprise.

14. An [formula omitted] query time algorithm for reducing ϵ-NN to (c,r)-NN.

15. Metaheuristics for pharmacometrics.

16. A novel algorithmic construction for deductions of categorical polysyllogisms by Carroll's diagrams.

17. Reference-Based Framework for Spatio-Temporal Trajectory Compression and Query Processing.

18. Sublinear-Time Algorithms for Compressive Phase Retrieval.

19. An Improved Decoding Algorithm to Decode Quadratic Residue Codes Based on the Difference of Syndromes.

20. ROAM: A Fundamental Routing Query on Road Networks with Efficiency.

21. Multi-Agent Deep Reinforcement Learning for Urban Traffic Light Control in Vehicular Networks.

22. Implementing Clenshaw-Curtis Quadrature, II Computing the Cosine Transformation.

23. Implementing Clenshaw-Curtis Quadrature, I Methodology and Experience.

24. Research on OpenCL optimization for FPGA deep learning application.

25. A distributed message passing algorithm for computing perfect demand matching.

26. Efficient Top-k Dominating Computation on Massive Data.

27. The history of Algorithmic complexity.

28. Needs, Pains, and Motivations in Autonomous Agents.

29. Collaborative linear manifold learning for link prediction in heterogeneous networks.

30. Introducing Cuts Into a Top-Down Process for Checking Tree Inclusion.

31. A device binding method based on content illumination pattern in public display environments.

32. A simple linear time algorithm for the locally connected spanning tree problem on maximal planar chordal graphs.

33. A short certificateless aggregate signature against coalition attacks.

34. An Efficient Algorithm for LCS Problem between Two Arbitrary Sequences.

35. Enhancing the robustness of recommender systems against spammers.

36. An improved memory-based collaborative filtering method based on the TOPSIS technique.

37. Computer Science and Game Theory.

38. A New Asymptotic Notation: Weak Theta.

39. Square Root Computation over Even Extension Fields.

40. How to catch [formula omitted]-heavy-hitters on sliding windows.

41. Intrusion detection system using Online Sequence Extreme Learning Machine (OS-ELM) in advanced metering infrastructure of smart grid.

42. Uncovering Randomness and Success in Society.

43. AHaH Computing–From Metastable Switches to Attractors to Machine Learning.

44. Linear Mixed Effects Models under Inequality Constraints with Applications.

45. Overlapping Structures in Sensory-Motor Mappings.

46. Different Approaches for Extracting Information from the Co-Occurrence Matrix.

47. Small and Dim Target Detection via Lateral Inhibition Filtering and Artificial Bee Colony Based Selective Visual Attention.

48. Enlarge the Training Set Based on Inter-Class Relationship for Face Recognition from One Image per Person.

49. Integration of Equation- and Signal-Based Models in Transient Analysis of Electric Energy Systems.

50. Efficient Algorithms for the Identification of Top-$k$ Structural Hole Spanners in Large Social Networks.