• No results found

divide and conquer

ANALYSIS OF DIVIDE-AND CONQUER LOCAL SEARCH HEURISTICS WITH QUADRANT AND NEIGHBOR RESTRICTIONS

ANALYSIS OF DIVIDE-AND CONQUER LOCAL SEARCH HEURISTICS WITH QUADRANT AND NEIGHBOR RESTRICTIONS

... a divide-and-conquer local search heuristic with quadrant restrictions (DACQ) and a divide-and-conquer local search heuristic with neighbor restrictions ...

9

Divide and conquer: A proportional, minimal envy cake cutting algorithm

Divide and conquer: A proportional, minimal envy cake cutting algorithm

... to divide a cake that the players value along one ...literature—one, divide-and-conquer (D&C), minimizes the maximum number of players that any single player can ...line—that divide it ...

18

Divide and Conquer Algorithm for Multilingual Scripting Programming Language (MLProScript)

Divide and Conquer Algorithm for Multilingual Scripting Programming Language (MLProScript)

... Beside the good time-complexity of the aforementioned algorithms, their implementation is not straightforward especially in scripting and end-user Programming languages [7]. These new trends in programming language ...

7

Resolving Ambiguities of Chinese Conjunctive Structures by Divide and conquer Approaches

Resolving Ambiguities of Chinese Conjunctive Structures by Divide and conquer Approaches

... Conjunctive boundary detection is not a simple task. It is not only time consuming but also knowl- edge intensive. Therefore we propose a context- dependent rules matching approach to handle sim- ple cases to get fast ...

6

A comparison of pop and chop to divide and conquer in resident cataract surgery

A comparison of pop and chop to divide and conquer in resident cataract surgery

... cases early in residency training, based on the data obtained, it was concluded that pop and chop seems to be as safe as divide and conquer for novice surgeons. In a study on more experienced trainees ...

5

Data stream clustering by divide and conquer approach based on vector model

Data stream clustering by divide and conquer approach based on vector model

... uses divide and conquer approach to cluster stream of ...using Divide and Conquer method for clustering is that STREAM exploits it for segmenta- tion of entire data (divide), finding ...

21

Divide and conquer with sequential Monte Carlo

Divide and conquer with sequential Monte Carlo

... The idea underlying D&C-SMC is that an approximation can be made to any multivariate distribution by splitting the collection of model variables into disjoint sets and defining, for each of these sets, a suitable ...

30

Implementing Divide and Conquer Technique for a Big-Data Traffic

Implementing Divide and Conquer Technique for a Big-Data Traffic

... all divide and conquer algorithms, usually if N (define N) is very large then we will go for divide and conquer technique, but now a day’s database is very large so we are applying same ...

5

A Sharper Generalization Bound for Divide-and-Conquer Ridge Regression

A Sharper Generalization Bound for Divide-and-Conquer Ridge Regression

... Our result is not directly applicable to the divide-and- conquer kernel ridge regression (DC-KRR) (Zhang, Duchi, and Wainwright 2015; Lin, Guo, and Zhou 2017). Because the feature space of kernel method is ...

8

P-Coffee: A New Divide-and-conquer Method for Multiple Sequence Alignment

P-Coffee: A New Divide-and-conquer Method for Multiple Sequence Alignment

... We describe a new divide-and-conquer method, P-Coffee, for alignment of multiple sequences. P-Coffee first identifies candidate alignment columns using a position-specific substitution matrix (the T-Coffee ...

80

An Effectual Identification and Prevention OF DDOS Attacks in Web Using Divide-And-Conquer Algorithm

An Effectual Identification and Prevention OF DDOS Attacks in Web Using Divide-And-Conquer Algorithm

... This all entry details are stored as history list, if the list is contains n number of items, then implement a technique called DDoS Divide-and- Conquer algorithm. The list has to be partitioned by using ...

6

Implementasi Algoritma Divide And Conquer Pada Aplikasi Belajar Ilmu Tajwid

Implementasi Algoritma Divide And Conquer Pada Aplikasi Belajar Ilmu Tajwid

... yaitu divide and conquer. Algoritma divide and conquer diimplementasikan pada pencarian jawaban pada soal yang ada pada menu ...Algoritma divide and conquer mempunyai cara kerja ...

7

Initialization of 
		optimized K Means centroids using divide and conquer method

Initialization of optimized K Means centroids using divide and conquer method

... and-conquer method. In proposed algorithm, initial cluster centers are obtained with the help of divide-and-conquer method and after that K-Means algorithm is applied. This paper presents an improved ...

6

Title: Analyze the Performance of Divide and Conquer Scheme for Wireless Sensor Network

Title: Analyze the Performance of Divide and Conquer Scheme for Wireless Sensor Network

... etc. Divide and conquer is also one of the efficient technique which is based upon manually ...paper, divide and conquer scheme is explained in ...

5

EasyFJP: Providing Hybrid Parallelism as a Concern for Divide and Conquer Java Applications

EasyFJP: Providing Hybrid Parallelism as a Concern for Divide and Conquer Java Applications

... JR [8] provides a rich concurrency model supporting remote JVM and object creation, asynchronous communication and rendezvous. JR codes are trans- lated into regular Java codes. JCluster [46] supports the execution of ...

36

Divide and Conquer: Crowdsourcing the Creation of Cross Lingual Textual Entailment Corpora

Divide and Conquer: Crowdsourcing the Creation of Cross Lingual Textual Entailment Corpora

... paper we addressed the multilingual dimension of the problem. Our primary goal was the creation of large-scale collections of entailment pairs for differ- ent language combinations. Besides that, we consid- ered cost ...

10

Statistically consistent divide-and-conquer pipelines for phylogeny estimation using NJMerge

Statistically consistent divide-and-conquer pipelines for phylogeny estimation using NJMerge

... a divide-and-conquer approach that does not require supertree estimation: we divide the species set into pairwise disjoint subsets, construct a tree on each subset using a base method, and then ...

17

New  Insights  into  Divide-and-Conquer  Attacks  on  the  Round-Reduced  Keccak-MAC

New Insights into Divide-and-Conquer Attacks on the Round-Reduced Keccak-MAC

... For the 6-round Keccak-MAC, we need 32-variable cubes to complete the divide-and-conquer attack. In the case of recovering A[0][0], for a cube, in order to make its cube sums do not depend on the value of ...

15

An Efficient Divide and Conquer Algorithm for Morphological Filters

An Efficient Divide and Conquer Algorithm for Morphological Filters

... the divide-and- conquer paradigm, i.e. divide, conquer, combine, at each level of the recursion, the details of each step are illustrated ...

6

Exploiting Plaintiffs Through Settlement: Divide and Conquer

Exploiting Plaintiffs Through Settlement: Divide and Conquer

... benchmark. Plaintiffs may achieve such a commitment with the help of a policy or court regulation prohibiting discriminatory offers. Indeed, in class action suits, courts often intervene settlement processes, in large ...

25

Show all 10000 documents...

Related subjects