Search alternatives:
encoding algorithm » cosine algorithm (Expand Search)
case finding » cam binding (Expand Search)
encoding algorithm » cosine algorithm (Expand Search)
case finding » cam binding (Expand Search)
-
61
-
62
A survey and comparison of wormhole routing techniques in a meshnetworks
Published 1997“…These multiprocessing systems consist of processing elements or nodes which are connected together by interconnection networks in various topologies. …”
Get full text
Get full text
article -
63
A MIMO Sampling-Rate-Dependent Controller
Published 2014“…An analytic approach for finding the parameters of the SRD controller that guarantees reference output trajectory tracking is presented. …”
Get full text
Get full text
Get full text
Get full text
article -
64
Data Generation for Path Testing
Published 2004“…We present two stochastic search algorithms for generating test cases that execute specified paths in a program. …”
Get full text
Get full text
Get full text
article -
65
A new approach and faster exact methods for the maximum common subgraph problem
Published 2017“…A detailed analysis shows that the proposed algorithm requires O((m+1)n) time, which is a superior worst-case bound to those known for previously-analyzed algorithms in the setting of the MCS problem. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
66
I Will Survive: An Event-driven Conformance Checking Approach Over Process Streams
Published 2023“…In extreme cases, the IWS finds prefix alignments roughly three orders of magnitude faster than previous approximate methods. …”
Get full text
Get full text
Get full text
-
67
Development of a deep learning-based group contribution framework for targeted design of ionic liquids
Published 2024“…Correlation results align with the experimental data, affirming the applicability of our framework. Finally, the algorithm is employed in a CO<sub>2</sub> capture case study to generate and select the best-performing novel ILs, which exhibit behavior consistent with established ILs in the literature.…”
-
68
Evacuation of a highly congested urban city
Published 2017“…The algorithm uses Dijkstras algorithm to find the shortest path(s) and a modified greedy algorithm to assign maximum flows to selected paths given a specific schedule per time interval. …”
Get full text
Get full text
Get full text
conferenceObject -
69
Optical recognition of electrical circuit drawings
Published 1997Get full text
Get full text
article -
70
Efficient Seismic Volume Compression using the Lifting Scheme
Published 2000“…In addition, the lifting scheme offers: 1) a dramatic reduction of the required auxiliary memory, 2) an efficient combination with parallel rendering algorithms to perform arbitrary surface and volume rendering for interactive visualization, and 3) an easy integration in the parallel I/O seismic data loading routines. …”
Get full text
article -
71
Recovery of business intelligence systems
Published 2018“…In the best case, the proposed algorithm requires 0.43 ms, which is 86 times faster than the fastest recent work. …”
Get full text
Get full text
Get full text
Get full text
article -
72
ElGamal Public-Key cryptosystem in multiplicative groups of quotient rings of polynomials over finite fields
Published 2005“…The arithmetic needed in this new setting is described. Examples, algorithms and proofs are given. Advantages of the new method are pointed out and comparisons with the classical case of F2m are made.…”
Get full text
Get full text
Get full text
Get full text
article -
73
Optimization of PV Cleaning Practices: Comparison Between Performance-Based and Periodic-Based Approaches
Published 2020“…Three scenarios resulted in improved net cost benefit (NCB), up to 34% for the case of performance-based manual cleaning. The fourth scenario resulted in diminished NCB, down by 245% for the case of daily automatic cleaning. …”
Get full text
Get full text
-
74
PERF solutions for distributed query optimization. (c1999)
Published 1999Get full text
Get full text
masterThesis -
75
Economic Production Lot-Sizing For An Unreliable Machine Under Imperfect Age-Based Maintenance Policy
Published 2020“…Some useful properties of the cost function are developed to characterize the optimal policy. An algorithm is also proposed to find the optimal solutions to the problem at hand. …”
Get full text
article -
76
A Geometric-Primitives-Based Compression Scheme for Testing Systems-on-a-Chip
Published 2001“…In this paper, it is assumed that an embedded core will be used to execute the decompression algorithm and decompress the test data.…”
Get full text
article -
77
A geometric-primitives-based compression scheme for testingsystems-on-a-chip
Published 2001“…In this paper, it is assumed that an embedded core will be used to execute the decompression algorithm and decompress the test data…”
Get full text
Get full text
article -
78
STEM: spatial speech separation using twin-delayed DDPG reinforcement learning and expectation maximization
Published 2025“…For stationary sources, the proposed system gives satisfactory performance in terms of quality, intelligibility, and separation speed, and generalizes well with the test data from a mismatched speech corpus. Its perceptual evaluation of speech quality (PESQ) score is 0.55 points better than a self-supervised learning (SSL) model and almost equivalent to the diffusion models at computational cost and training data which is many folds lesser than required by these algorithms. …”
-
79
Anomaly Detection Based Framework for Profile Monitoring
Published 2023Get full text
doctoralThesis -
80
Dynamic adaptation for video streaming over mobile devices. (c2013)
Published 2013Get full text
Get full text
masterThesis