Search Results - "Approximate algorithm"

Refine Results
  1. 1

    Fast density clustering strategies based on the k-means algorithm by Bai, Liang, Cheng, Xueqi, Liang, Jiye, Shen, Huawei, Guo, Yike

    ISSN: 0031-3203, 1873-5142
    Published: Elsevier Ltd 01.11.2017
    Published in Pattern recognition (01.11.2017)
    “…•Study how to enhance the scalability of a density clustering algorithm by k-means.•Propose an accelerated algorithm of density clustering by k-means.•Propose…”
    Get full text
    Journal Article
  2. 2

    A hybrid algorithm combining glowworm swarm optimization and complete 2-opt algorithm for spherical travelling salesman problems by Chen, Xin, Zhou, Yongquan, Tang, Zhonghua, Luo, Qifang

    ISSN: 1568-4946, 1872-9681
    Published: Elsevier B.V 01.09.2017
    Published in Applied soft computing (01.09.2017)
    “…•The Traveling Salesman Problem (TSP) is one of the most well-known combinatorial optimization problems.•This paper we extend the two-dimensional TSP to the…”
    Get full text
    Journal Article
  3. 3

    Identifying critical weak points of power-gas integrated energy system based on complex network theory by Zhang, Chenwei, Wang, Ying, Zheng, Tao, Wang, Chen, Zhang, Kaifeng

    ISSN: 0951-8320
    Published: Elsevier Ltd 01.06.2024
    Published in Reliability engineering & system safety (01.06.2024)
    “…•Weighted coupling betweenness is proposed to identify critical weak points in PGIS.•An approximate algorithm of shortest-paths calculations (AA-SPC) is…”
    Get full text
    Journal Article
  4. 4
  5. 5

    Bunkering policies for a fuel bunker management problem for liner shipping networks by De, Arijit, Choudhary, Alok, Turkay, Metin, Tiwari, Manoj K.

    ISSN: 0377-2217, 1872-6860
    Published: Elsevier B.V 16.03.2021
    Published in European journal of operational research (16.03.2021)
    “…•We investigate a dynamic bunker fuel management problem for liner shipping.•We consider fuel bunkering policies with the dynamic fuel price scenarios and fuel…”
    Get full text
    Journal Article
  6. 6

    Deterministic Approximate Methods for Maximum Consensus Robust Fitting by Le, Huu, Chin, Tat-Jun, Eriksson, Anders, Do, Thanh-Toan, Suter, David

    ISSN: 0162-8828, 1939-3539, 2160-9292, 1939-3539
    Published: United States IEEE 01.03.2021
    “…Maximum consensus estimation plays a critically important role in several robust fitting problems in computer vision. Currently, the most prevalent algorithms…”
    Get full text
    Journal Article
  7. 7

    The role of influential nodes and their influence domain in community detection: An approximate method for maximizing modularity by Javadpour Boroujeni, Rouhollah, Soleimani, Seyfollah

    ISSN: 0957-4174, 1873-6793
    Published: New York Elsevier Ltd 15.09.2022
    Published in Expert systems with applications (15.09.2022)
    “…•Modularity maximization is one of the newest methods for community detection.•Using approximate algorithms based on identifying influential nodes for…”
    Get full text
    Journal Article
  8. 8

    An on-the-fly framework for usable access control policy mining by Guo, Yunchuan, Wang, Xiao, Yu, Mingjie, Li, Fenghua, Pang, Zhen, Fang, Liang

    ISSN: 0167-4048
    Published: Elsevier Ltd 01.03.2025
    Published in Computers & security (01.03.2025)
    “…Access control policy mining, which extracts or infers access control policies from existing system logs or configurations within a given environment, is…”
    Get full text
    Journal Article
  9. 9

    An approximation algorithm for K-best enumeration of minimal connected edge dominating sets with cardinality constraints by Kurita, Kazuhiro, Wasa, Kunihiro

    ISSN: 0304-3975, 1879-2294
    Published: Elsevier B.V 24.07.2024
    Published in Theoretical computer science (24.07.2024)
    “…K-best enumeration, which asks to output k-best solutions without duplication, is a helpful tool in data analysis for many fields. In such fields, graphs…”
    Get full text
    Journal Article
  10. 10

    A provably efficient in-network computing services deployment approach for security burst by Zheng, Danyang, Wang, Chao, Xu, Honghui, Tang, Wenyi, Zhong, Yihan, Cao, Xiaojun

    ISSN: 1389-1286
    Published: Elsevier B.V 01.11.2025
    “…•Towards the periodic need for enhancing and migrating security service to defend against ever-changing cyber-attacks within the in-network computing (INC)…”
    Get full text
    Journal Article
  11. 11

    Just-in-time two-dimensional bin packing by Polyakovskiy, Sergey, M’Hallah, Rym

    ISSN: 0305-0483, 1873-5274
    Published: Elsevier Ltd 01.07.2021
    Published in Omega (Oxford) (01.07.2021)
    “…•We combine bin packing and just-in-time batch scheduling into a new problem.•We minimize total weighted earliness tardiness in a combined packing scheduling…”
    Get full text
    Journal Article
  12. 12

    Towards cost optimization in security-aware service function chaining and embedding over multi-vendor edge networks by Wang, Chao, Zheng, Danyang, Liu, Xiaorong, Tang, Wenyi, Xu, Honghui, Cao, Xiaojun

    ISSN: 1389-1286
    Published: Elsevier B.V 01.02.2025
    “…Frequent cyber-attacks compel service providers to employ security-aware service functions (S-SFs) while delivering network services. Typically, one S-SF can…”
    Get full text
    Journal Article
  13. 13

    A cost-provable solution for reliable in-network computing-enabled services deployment by Liu, Xiaorong, Zheng, Danyang, Xing, Huanlai, Feng, Li, Peng, Chengzong, Cao, Xiaojun

    ISSN: 1389-1286
    Published: Elsevier B.V 01.02.2025
    “…Recently, the in-network computing (INC) technique has been widely adopted by various applications including the reliability-sensitive ones such as remote…”
    Get full text
    Journal Article
  14. 14

    Provably efficient security-aware service function tree composing and embedding in multi-vendor networks by Zheng, Danyang, Xing, Huanlai, Feng, Li, Cao, Xiaojun

    ISSN: 1389-1286
    Published: Elsevier B.V 01.12.2024
    “…Multicast greatly benefits many emerging applications such as federated learning, metaverse, and data warehouse. Recently, due to frequent cyber-attacks,…”
    Get full text
    Journal Article
  15. 15

    Mhorseshoe package in R: Approximate algorithm for the horseshoe prior in Bayesian linear model by Kang, Mingi, Lee, Kyoungjae

    ISSN: 2352-7110, 2352-7110
    Published: Elsevier B.V 01.09.2025
    Published in SoftwareX (01.09.2025)
    “…The horseshoe prior is a continuous shrinkage prior frequently used in high-dimensional Bayesian sparse linear regression models. Although the horseshoe prior…”
    Get full text
    Journal Article
  16. 16

    Event-Participant and Incremental Planning over Event-Based Social Networks by Cheng, Yurong, Yuan, Ye, Chen, Lei, Giraud-Carrier, Christophe, Wang, Guoren, Li, Boyang

    ISSN: 1041-4347, 1558-2191
    Published: New York IEEE 01.02.2021
    “…In recent years, online Event Based Social Network (EBSN) platforms have become increasingly popular. One typical task of EBSN platforms is to help users make…”
    Get full text
    Journal Article
  17. 17

    Exact and approximate algorithms for discounted {0-1} knapsack problem by He, Yi-Chao, Wang, Xi-Zhao, He, Yu-Lin, Zhao, Shu-Liang, Li, Wen-Bin

    ISSN: 0020-0255, 1872-6291
    Published: Elsevier Inc 10.11.2016
    Published in Information sciences (10.11.2016)
    “…The Discounted {0-1} Knapsack Problem (D{0-1}KP) is an extension of the classical 0-1 knapsack problem (0-1 KP) that consists of selecting a set of item groups…”
    Get full text
    Journal Article
  18. 18

    Heuristic and approximate Steiner tree algorithms for ensuring network connectivity in mobile wireless sensor networks by Son, Nguyen Van, Hanh, Nguyen Thi, Minh, Trinh The, Binh, Huynh Thi Thanh, Thang, Nguyen Xuan

    ISSN: 1084-8045
    Published: Elsevier Ltd 01.06.2025
    “…Connectivity problems are among the most challenging issues in Mobile Wireless Sensor Networks (MWSNs). Ensuring connectivity in such networks means finding…”
    Get full text
    Journal Article
  19. 19

    Multi-Batches Revenue Maximization for competitive products over online social network by Liang, Guangxian, Yao, Xiaopeng, Gu, Yue, Huang, Hejiao, Gu, Chonglin

    ISSN: 1084-8045, 1095-8592
    Published: Elsevier Ltd 01.05.2022
    “…Enterprises can promote their products widely and rapidly over Online Social Network (OSN) through viral marketing. Viral marketing means an enterprise gives…”
    Get full text
    Journal Article
  20. 20

    Algorithms for Cameras View-Frame Placement Problems in the Presence of an Adversary and Distributional Ambiguity by Park, Seonghun, Bansal, Manish

    ISSN: 1545-5955, 1558-3783
    Published: IEEE 2025
    “…In this paper, we introduce cameras view-frame placement problem (denoted by CFP) in the presence of an adversary whose objective is to minimize the maximum…”
    Get full text
    Journal Article