Search alternatives:
processing algorithm » processing algorithms (Expand Search)
data fitting » data mining (Expand Search), data hiding (Expand Search)
element » elements (Expand Search)
search » research (Expand Search)
processing algorithm » processing algorithms (Expand Search)
data fitting » data mining (Expand Search), data hiding (Expand Search)
element » elements (Expand Search)
search » research (Expand Search)
-
61
-
62
-
63
Degree-Based Network Anonymization
Published 2020Get full text
Get full text
Get full text
masterThesis -
64
Machine learning based approaches for intelligent adaptation and prediction in banking business processes. (c2018)
Published 2018“…Companies, nowadays, rely on systems and applications to automate their business processes and data management. In this context, the notion of integrating machine learning techniques in banking business processes has emerged, where trainable computational algorithms can be improved by learning. …”
Get full text
Get full text
Get full text
masterThesis -
65
Topics in graph algorithms
Published 2003“…This is achieved by implementing some algorithms for the vertex cover problem, and conducting experiments on real data sets. …”
Get full text
Get full text
Get full text
masterThesis -
66
On the Optimization of Band Gaps in Periodic Waveguides
Published 2025“…<h3 dir="ltr">Purpose</h3><p dir="ltr">This work applies a computational framework for vibration attenuation in periodic structures by combining the established wave and finite element (WFE) method with nature-inspired optimization algorithms. …”
-
67
-
68
-
69
-
70
-
71
Distributed Tree-Based Machine Learning for Short-Term Load Forecasting With Apache Spark
Published 2021“…The paper proposes a concurrent job scheduling algorithm in a multi-energy data source environment using Apache Spark. …”
-
72
-
73
-
74
Practical Multiple Node Failure Recovery in Distributed Storage Systems
Published 2016Get full text
Get full text
Get full text
Get full text
conferenceObject -
75
Random Forest Bagging and X‐Means Clustered Antipattern Detection from SQL Query Log for Accessing Secure Mobile Data
Published 2021“…In addition, for grouping similar antipatterns, a clustering process was performed to eradicate the design errors. …”
-
76
Severity-Based Prioritized Processing of Packets with Application in VANETs
Published 2019“…In this study, we propose a generic prioritization and resource management algorithm that can be used to prioritize processing of received packets in vehicular networks. …”
-
77
A Novel Genetic Algorithm Optimized Adversarial Attack in Federated Learning for Android-Based Mobile Systems
Published 2025“…<p dir="ltr">Federated Learning (FL) is gaining traction in Android-based consumer electronics, enabling collaborative model training across decentralized devices while preserving data privacy. However, the increasing adoption of FL in these devices exposes them to adversarial attacks that can compromise user data and device security. …”
-
78
-
79
Process Mining over Unordered Event Streams
Published 2020“…This requires online algorithms that, instead of keeping the whole history of event data, work incrementally and update analysis results upon the arrival of new events. …”
Get full text
Get full text
Get full text
-
80
Mapping realistic data sets on parallel computers
Published 1993Get full text
Get full text
Get full text
Get full text
conferenceObject