Search alternatives:
encoding algorithm » cosine algorithm (Expand Search)
finding » findings (Expand Search)
Showing 41 - 55 results of 55 for search '(( elements network algorithm ) OR ((( data encoding algorithm ) OR ( path finding algorithm ))))', query time: 0.10s Refine Results
  1. 41

    A geometric-primitives-based compression scheme for testingsystems-on-a-chip by El-Maleh, A.

    Published 2001
    “…In this paper, it is assumed that an embedded core will be used to execute the decompression algorithm and decompress the test data…”
    Get full text
    Get full text
    article
  2. 42

    STEM: spatial speech separation using twin-delayed DDPG reinforcement learning and expectation maximization by Muhammad Salman Khan (7202543)

    Published 2025
    “…For stationary sources, the proposed system gives satisfactory performance in terms of quality, intelligibility, and separation speed, and generalizes well with the test data from a mismatched speech corpus. Its perceptual evaluation of speech quality (PESQ) score is 0.55 points better than a self-supervised learning (SSL) model and almost equivalent to the diffusion models at computational cost and training data which is many folds lesser than required by these algorithms. …”
  3. 43
  4. 44

    Query acceleration in distributed database systems by Haraty, Ramzi A.

    Published 2001
    “…Query optimization strategies aim to minimize the cost of transferring data across networks. Many techniques and algorithms have been proposed to optimize queries. …”
    Get full text
    Get full text
    Get full text
    article
  5. 45
  6. 46
  7. 47
  8. 48
  9. 49
  10. 50

    Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures by JUMA, MAZEN GHAZI

    Published 2021
    “…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …”
    Get full text
  11. 51
  12. 52

    PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits by Hind Almerekhi (7434776)

    Published 2022
    “…Implications are that toxicity trigger detection algorithms can leverage generic approaches but must also tailor detections to specific communities.…”
  13. 53

    Cohen syndrome and early-onset epileptic encephalopathy in male triplets: two disease-causing mutations in VPS13B and NAPB by Alice AbdelAleem (17753799)

    Published 2023
    “…Sanger sequencing verified the segregation of the two recessive gene variants with the phenotype in family members. The prediction algorithms support the pathogenicity of these variants. …”
  14. 54

    Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité by Mourad, Azzam

    Published 2009
    “…The first one is the GAFlow, the Closest Guaranteed Ancestor, which returns the closest ancestor join point to the pointcuts of interest that is on all their runtime paths. The second one is the GDFlow, the Closest Guaranteed Descendant, which returns the closest child join point that can be reached by all paths starting from the pointcuts of interest. …”
    Get full text
    Get full text
    Get full text
    article
  15. 55

    New aspect-oriented constructs for security hardening concerns by Mourad, Azzam

    Published 2009
    “…The first one is the GAFlow, Closest Guaranteed Ancestor, which returns the closest ancestor join point to the pointcuts of interest that is on all their runtime paths. The second one is the GDFlow, Closest Guaranteed Descendant, which returns the closest child join point that can be reached by all paths starting from the pointcut of interest. …”
    Get full text
    Get full text
    Get full text
    article