• No results found

randomly generated instances

Model and Solution Approach for Multi objective-multi commodity Capacitated Arc Routing Problem with Fuzzy Demand

Model and Solution Approach for Multi objective-multi commodity Capacitated Arc Routing Problem with Fuzzy Demand

... demand generated randomly are ...on randomly generated instances in which the required edges have demand for two commodities (data set ...

22

Conjugacy  Separation  Problem  in  Braids:  an  Attack  on  the  Original  Colored  Burau  Key  Agreement  Protocol

Conjugacy Separation Problem in Braids: an Attack on the Original Colored Burau Key Agreement Protocol

... long randomly generated ...tested randomly generated instances is increased by the factor of two compared to the lengths suggested in the original proposal for 120 bits of ...

17

The effect of temporary links in randomly generated networks of constraints

The effect of temporary links in randomly generated networks of constraints

... problem instances to instances that take several CPU minutes to ...100 randomly generated instances (for each version we carried out a number of 100 trials, retaining the average of the ...

13

The Assouad dimension of randomly generated fractals

The Assouad dimension of randomly generated fractals

... Self-affine carpets are a special type of planar self-affine set that were first studied independently by Bedford and McMullen in the 1980s [Be, Mc]. The properties of Bedford and McMullen’s original model and various ...

25

Finding Patterns in Noisy Crowds: Regression based Annotation Aggregation for Crowdsourced Data

Finding Patterns in Noisy Crowds: Regression based Annotation Aggregation for Crowdsourced Data

... Instances were grouped into Human Intelli- gence Tasks (HITs) containing all instances asso- ciated with 10 sentences each. Five worker assign- ments were requested per HIT, and Turkers were paid $0.20 per ...

6

Energy Detection Technique in Cognitive Radio System

Energy Detection Technique in Cognitive Radio System

... Abstract — Energy detection is one of the spectrum sensing techniques in cognitive radio system that facilitate to detect vacancies in spectrum frequency. Energy detection also denoted as non-coherent detection is the ...

5

Study of Self-Generated Sexually Explicit Images & Videos Featuring Young People Online

Study of Self-Generated Sexually Explicit Images & Videos Featuring Young People Online

... The findings of the study are based on a snapshot of self-generated content located and assessed within a one month period. Whilst the large volume of images and videos gives an indication that the amount of ...

10

High-contrast algorithm behavior: Observation, conjecture, and experimental design

High-contrast algorithm behavior: Observation, conjecture, and experimental design

... The focus is on methodology. Ideally, we could profile problem instances and choose the better algorithm. Our study is a limited step in that direction. Observations in the form of experimental data from the ...

11

Active Learning with Transfer Learning

Active Learning with Transfer Learning

... To further reduce the labeling cost and avoid negative transfer, we propose a framework, namely Active Vector Rotation (AVR), which takes advantage of both active learning and transfer learning techniques. Basically, AVR ...

6

Weak  Instances  of  PLWE

Weak Instances of PLWE

... In this paper, we investigate the extent to which the hardness of these prob- lems holds in more general number rings, that is, when the number field is not necessarily a cyclotomic field generated by roots of ...

12

Ranking the Best Instances

Ranking the Best Instances

... scoring functions. We have provided two non-trivial examples for which this is the case (Theorems 20 and 24). But, in general, this remark should prevent from considering ’naive’ two-step strategies for solving the local ...

29

Toward a Pattern-Based Release Planning

Toward a Pattern-Based Release Planning

... V. R ELEASE P LANNING C USTOMIZATION U SING A P ATTERN It is tried in customization of release planning general process to investigate experiences in the form of effective parameters on each stage and to consider the ...

5

Role of Patterns in Automated Task-Driven Grammar Refactoring

Role of Patterns in Automated Task-Driven Grammar Refactoring

... In our previous work [13], we addressed this issue by proposing an evolutionary algorithm for automated task-driven grammar refactoring. The algorithm is called mARTINICA (met- rics Automated Refactoring Task-driven ...

16

Mask Data Priming Network for Automatic Check-Out

Mask Data Priming Network for Automatic Check-Out

... first randomly select the extracted items and then randomly paste them on the prepared background image so that each item is less than 50% obscured, we call this step is Operation ...mask randomly on ...

9

an apprenticeship of childhood: first instances

an apprenticeship of childhood: first instances

... reforçam a idéia das etapas ou ciclos de vida, bem como as diferentes formas de interação social na aprendizagem de acordo com as diferentes idades de vida, mesmo que sejam confrontadas [r] ...

10

Instances and concepts in distributional space

Instances and concepts in distributional space

... of instances (some cats are black, Germany has 80 million in- habitants), and Kruszewski et ...of instances and concepts, limited to a few manually defined features, is Alfonseca and Manandhar ...

7

A Taskdriven Grammar Refactoring Algorithm

A Taskdriven Grammar Refactoring Algorithm

... language generated by the grammar [12], or it may influence, and in many cases limit, our choice of parser generator for use in implementing the syntactic analyzer ...

7

Concolic Testing for Deep Neural Networks

Concolic Testing for Deep Neural Networks

... the generated test cases may be restricted to a subset of the execution paths of the program and the probability of exploring execution paths that contain bugs can be extremely ...

11

Firewall Policy Testing And Optimization
   K.Rohit, S.Afzal, T.Manoranjitham  Abstract PDF  IJIRMET160206007

Firewall Policy Testing And Optimization K.Rohit, S.Afzal, T.Manoranjitham Abstract PDF IJIRMET160206007

... There is a way by which we can optimize and test the firewall before its deployment in the network.The testing is generally done to determine the efficiency of the firewall and based on which further optimization can be ...

8

Show all 10000 documents...

Related subjects