Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
model algorithm » mould algorithm (Expand Search)
level modeling » event modeling (Expand Search)
element » elements (Expand Search)
Showing 141 - 160 results of 205 for search '(( element method algorithm ) OR ((( element model algorithm ) OR ( level modeling algorithm ))))', query time: 0.12s Refine Results
  1. 141

    Degree-Based Network Anonymization by Halawi, Ola

    Published 2020
    “…In this thesis, we study a new multi- objective parameterized anonymization approach that generalizes the known degree anonymization problem and attempts at improving it as a more realistic model for data security/privacy. Our model suggests a convenient privacy level for each net- work based on the standard deviation of its degrees. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  2. 142

    An automated temporal partitioning tool for a class of DSP applications by Ouaiss, Iyad

    Published 1998
    “…We present an automated temporal partitioning tool for developing dynamical ly recon gurable designs starting from behavior level speci cations for a class of dsp applications. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  3. 143
  4. 144

    An automated temporal partitioning and loop fission approach for FPGA based reconfigurable synthesis of DSP applications by Ouaiss, I.

    Published 2017
    “…We present an automated temporal partitioning and loop transformation approach for developing dynamically reconfigurable designs starting from behavior level specifications. An Integer Linear Programming (ILP) model is formulated to achieve near-optimal latency designs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  5. 145

    Joint BS Assignment and End-to-End Scheduling for Wireless Cellular Networks with Heterogeneous Services by Saad, Walid

    Published 2010
    “…Moreover, we extend the system model to include heterogeneous services with varying quality parameters. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  6. 146
  7. 147
  8. 148

    Data redundancy management for leaf-edges in connected environments by Mansour, Elio

    Published 2022
    “…To address these limitations, we propose here DRMF: Data Redundancy Management for leaF-edges allowing to identify and remove data redundancies in connected environments at the device level. DRMF considers both static and mobile edge devices, and provides two algorithms for temporal and spatio-temporal redundancy detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  9. 149

    A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security by S. Shitharth (12017480)

    Published 2023
    “…However, it limits the critical problems of high time complexity, computational cost, difficulty to understand, and reduced level of security. Therefore, the proposed work intends to implement a group of novel methodologies for developing an effective Cyborg intelligence security model to secure smart city systems. …”
  10. 150

    C-3PA: Streaming Conformance, Confidence and Completeness in Prefix-Alignments by Raun, Kristo

    Published 2023
    “…This paper introduces a novel approximate streaming conformance checking algorithm that enriches prefix-alignments with confidence and completeness measures. …”
    Get full text
    Get full text
    Get full text
  11. 151

    A simple approach for testing web service based applications by Tarhini, Abbas

    Published 2005
    “…In our technique, a web application and its composed components are specified by a two-level abstract model. The web application is represented as Task Precedence Graph (TPG) and the behavior of the composed components is represented as a Timed Labeled Transition System (TLTS). …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  12. 152

    Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey by Faria Nawshin (21841598)

    Published 2024
    “…<p dir="ltr">Mobile devices have become an essential element in our day-to-day lives. The chances of mobile attacks are rapidly increasing with the growing use of mobile devices. …”
  13. 153
  14. 154

    SemIndex+: A semantic indexing scheme for structured, unstructured, and partly structured data by Tekli, Joe

    Published 2018
    “…Various weighting functions and a parallelized search algorithm have been developed for that purpose and are presented here. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  15. 155

    Oversampling techniques for imbalanced data in regression by Samir Brahim Belhaouari (9427347)

    Published 2024
    “…For image datasets, we employ Multi-Level Autoencoders, consisting of Convolutional and Fully Connected Autoencoders. …”
  16. 156

    Blockchain-Based Decentralized Architecture for Software Version Control by Muhammad Hammad (17541570)

    Published 2023
    “…<p dir="ltr">Version control is an important component of configuration management, and most enterprise-level software uses different tools and technologies to manage the software version control such as CVS, Subversion, or Perforce. …”
  17. 157

    Analysis of Multi-User-Based UAV System With Outdated CSI by Parvez Shaik (21633041)

    Published 2024
    “…Optimization of UAV location and altitude is performed through a limited-memory Broyden-Fletcher-Goldfarb-Shanno (LBFGS) algorithm to attain minimum OP (MOP). Results illustrate optimal performance dependent on the channel correlation parameters, antenna elements, and fading conditions. …”
  18. 158
  19. 159

    Approximate XML structure validation based on document–grammar tree similarity by Tekli, Joe

    Published 2015
    “…Our approach exploits the concept of tree edit distance, introducing a novel edit distance recurrence and dedicated algorithms to effectively compare XML documents and grammar structures, modeled as ordered labeled trees. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  20. 160

    CAD TOOL FOR THE AUTOMATIC-GENERATION OF MICROPROGRAMS by Sait, Sadiq M.

    Published 2020
    “…Abstract A methodology for automatic synthesis of microprograms for digital systems modeled in the UAHPL register-transfer-level language is described. …”
    Get full text
    article