Suchergebnisse - name=Algorithms and Complexity

  1. 1

    Efficient Variant of Algorithm FastICA for Independent Component Analysis Attaining the CramÉr-Rao Lower Bound von Koldovsky, Z., Tichavsky, P., Oja, E.

    ISSN: 1045-9227, 1941-0093
    Veröffentlicht: New York, NY IEEE 01.09.2006
    Veröffentlicht in IEEE transactions on neural networks (01.09.2006)
    “… FastICA is one of the most popular algorithms for independent component analysis (ICA), demixing a set of statistically independent sources that have been …”
    Volltext
    Journal Article
  2. 2

    Wait-free algorithms for fast, long-lived renaming von Moir, Mark, Anderson, James H.

    ISSN: 0167-6423, 1872-7964
    Veröffentlicht: Amsterdam Elsevier B.V 01.10.1995
    Veröffentlicht in Science of computer programming (01.10.1995)
    “… Previous wait-free renaming algorithms have time complexity that is dependent on the size of the original name space …”
    Volltext
    Journal Article
  3. 3

    A fast region segmentation algorithm on compressed gray images using Non-symmetry and Anti-packing Model and Extended Shading representation von Zheng, Yunping, Sarem, Mudar

    ISSN: 1047-3203, 1095-9076
    Veröffentlicht: Elsevier Inc 01.01.2016
    “… •We propose a fast algorithm for image segmentation by using NAMES.•We put forward 4 extended Lemmas and 2 extended Theorems for region segmentation.•We …”
    Volltext
    Journal Article
  4. 4

    Crypt-JDBC模型:洋葱加密算法的优化改进 von 陈鹤, 田秀霞, 袁培森, 金澈清

    ISSN: 1673-9418
    Veröffentlicht: 上海电力学院 计算机科学与技术学院,上海 200090%南京农业大学 信息科技学院,南京,210095 2017
    Veröffentlicht in 计算机科学与探索 (2017)
    “… TP392; CryptDB是一种典型的密文存储技术,它根据运算操作语义使用洋葱加密算法将SQL语句改写到不同的洋葱密文列,从而仅暴露数据的部分属性即可执行查询任务.针对洋葱加密 …”
    Volltext
    Journal Article
  5. 5

    Recognition Method of Component Names in Patent Documents Based on the Algorithm of Word Frequency Difference and Library of Left-segmentation Words von Kong, Jiabin, Lyu, Jianwen, Liu, Jiangnan, Du, Wenxuan

    ISSN: 1002-137X
    Veröffentlicht: Chongqing Guojia Kexue Jishu Bu 01.07.2023
    Veröffentlicht in Ji suan ji ke xue (01.07.2023)
    “… units.Being flexible and changeable, the word formatting of component name represents the characteristics of uniqueness, complexity and lesser-known …”
    Volltext
    Journal Article
  6. 6

    Learning to Optimize: Training Deep Neural Networks for Interference Management von Sun, Haoran, Chen, Xiangyi, Shi, Qingjiang, Hong, Mingyi, Fu, Xiao, Sidiropoulos, Nicholas D.

    ISSN: 1053-587X, 1941-0476
    Veröffentlicht: New York IEEE 15.10.2018
    Veröffentlicht in IEEE transactions on signal processing (15.10.2018)
    “… However, optimization algorithms often entail considerable complexity, which creates a serious gap between theoretical design/analysis and real-time processing …”
    Volltext
    Journal Article
  7. 7

    Make It Short and Easy: Username Complexity Determines Trustworthiness Above and Beyond Objective Reputation von Silva, Rita R., Chrobot, Nina, Newman, Eryn, Schwarz, Norbert, Topolinski, Sascha

    ISSN: 1664-1078, 1664-1078
    Veröffentlicht: Switzerland Frontiers Media S.A 19.12.2017
    Veröffentlicht in Frontiers in psychology (19.12.2017)
    “… ? In 10 studies (total = 608) we explored username complexity and trustworthiness of eBay seller profiles …”
    Volltext
    Journal Article
  8. 8

    Enhancing Patient Identification Accuracy in Shared Child Health Records: a Hybrid Approach for the Lao Language Context von Sorsavanh, Thepphouthone, Liu, Chang, Yamamoto, Goshiro, Mori, Yukiko, Kobayashi, Shinji, Kuroda, Tomohiro

    ISSN: 1573-689X, 0148-5598, 1573-689X
    Veröffentlicht: New York Springer US 26.09.2025
    Veröffentlicht in Journal of medical systems (26.09.2025)
    “… , placeholder names such as “Eanoi”). Existing patient-matching algorithms designed for Latin scripts underperform in this context …”
    Volltext
    Journal Article
  9. 9

    Long lived adaptive splitter and applications von Yehuda, Afek, Stupp, Gideon, Touitou, Dan

    ISSN: 0178-2770, 1432-0452
    Veröffentlicht: Heidelberg Springer Nature B.V 01.04.2002
    Veröffentlicht in Distributed computing (01.04.2002)
    “… An implementation of a task is adaptive if the step complexity of any operation in the implementation is a function of the number of processes that take steps concurrently with the operation …”
    Volltext
    Journal Article
  10. 10

    An effective data indexing method for POI data von Xu, Zhan-Ya, Xiong, Yi-Hui, Ye, Hong

    ISSN: 2161-024X
    Veröffentlicht: IEEE 01.06.2015
    Veröffentlicht in International Conference on Geoinformatics (Online) (01.06.2015)
    “… The effective organization and management of POI data is an important basis for map service. In order to complete the auto-completion function, when users …”
    Volltext
    Tagungsbericht Journal Article
  11. 11

    Entanglement, and Unsorted Database Search in Noise-Based Logic von Kish, Laszlo B., Daugherity, Walter C.

    ISSN: 2076-3417, 2076-3417
    Veröffentlicht: Basel MDPI AG 2019
    Veröffentlicht in Applied sciences (2019)
    “… We explore the collapse of “wavefunction” and the measurement of entanglement in the superpositions of hyperspace vectors in classical physical …”
    Volltext
    Journal Article
  12. 12

    Efficient adaptive collect algorithms von Afek, Yehuda, De Levie, Yaron

    ISSN: 0178-2770, 1432-0452
    Veröffentlicht: Heidelberg Springer Nature B.V 01.10.2007
    Veröffentlicht in Distributed computing (01.10.2007)
    “… ), where n is the total number of processes in the system and k is the total contention. The step complexity of an unrestricted name space variant of this algorithm remains O(k …”
    Volltext
    Journal Article
  13. 13

    Application of sparse identification of nonlinear dynamics for physics-informed learning von Corbetta, Matteo

    Veröffentlicht: IEEE 01.03.2020
    Veröffentlicht in 2020 IEEE Aerospace Conference (01.03.2020)
    “… The complexity of the algorithm architecture, e.g., the number of hidden layers in a deep neural network, typically grows with the complexity of the problems they are required to solve, leaving little room for interpreting (or explaining …”
    Volltext
    Tagungsbericht
  14. 14

    Replacing suffix trees with enhanced suffix arrays von Abouelhoda, Mohamed Ibrahim, Kurtz, Stefan, Ohlebusch, Enno

    ISSN: 1570-8667, 1570-8675
    Veröffentlicht: Elsevier B.V 2004
    “… that uses an enhanced suffix array and solves the same problem in the same time complexity. The generic name enhanced suffix array stands for data structures consisting of the suffix array and additional tables …”
    Volltext
    Journal Article
  15. 15

    Adaptive and efficient mutual exclusion von Attiya, Hagit, Bortnikov, Vita

    ISSN: 0178-2770, 1432-0452
    Veröffentlicht: Heidelberg Springer Nature B.V 01.07.2002
    Veröffentlicht in Distributed computing (01.07.2002)
    “… (and not on n, the total number of processes). Our algorithm has O(k) remote step complexity and O(log k …”
    Volltext
    Journal Article
  16. 16

    A Covert Timing Channel via Algorithmic Complexity Attacks: Design and Analysis von Xiaoshan Sun, Liang Cheng, Yang Zhang

    ISBN: 9781612842325, 1612842321
    ISSN: 1550-3607
    Veröffentlicht: IEEE 01.06.2011
    “… In this paper, we propose a new covert timing channel which exploits the algorithmic complexity vulnerabilities in the name lookup algorithm of the kernel …”
    Volltext
    Tagungsbericht
  17. 17

    LD-SPatt: large deviations statistics for patterns on Markov chains von Nuel, G

    ISSN: 1066-5277
    Veröffentlicht: United States 2004
    Veröffentlicht in Journal of computational biology (2004)
    “… Statistics on Markov chains are widely used for the study of patterns in biological sequences. Statistics on these models can be done through several …”
    Weitere Angaben
    Journal Article
  18. 18

    Malicious Domain Names Detection Algorithm Based on N-Gram von Zeng, Xiang-Yan, Bao, Guangbin, Chang, Zhaobin, Hong, Zhao

    ISSN: 2090-7141, 2090-715X
    Veröffentlicht: Cairo, Egypt Hindawi Publishing Corporation 01.01.2019
    Veröffentlicht in Journal of computer networks and communications (01.01.2019)
    “… Malicious domain name attacks have become a serious issue for Internet security. In this study, a malicious domain names detection algorithm based on N-Gram is …”
    Volltext
    Journal Article
  19. 19

    Improved F-DBSCAN for Trip End Identification Using Mobile Phone Data in Combination with Base Station Density von Jiang, Haihang, Yang, Fei, Zhu, Xin, Yao, Zhenxing, Zhou, Tao

    ISSN: 0197-6729, 2042-3195
    Veröffentlicht: London Hindawi 30.04.2022
    Veröffentlicht in Journal of advanced transportation (30.04.2022)
    “… The other is for reducing time complexity; a fast clustering improvement for the algorithm is proposed …”
    Volltext
    Journal Article
  20. 20

    Chemometrics for pattern recognition von Brereton, Richard G

    ISBN: 9780470987254, 0470987251
    Veröffentlicht: Chichester, U.K Wiley 2009
    “… This has been catalysed by the increase in capabilities of automated instruments such as LCMS, GCMS, and NMR, to name a few, to obtain large quantities of data, and, in parallel, the significant …”
    Volltext
    E-Book Buch