• No results found

tree-based broadcast algorithm

Broadcast Routing in Wireless Ad-Hoc Networks: A Particle Swarm optimization Approach

Broadcast Routing in Wireless Ad-Hoc Networks: A Particle Swarm optimization Approach

... so-called Broadcast Incremental Power (BIP) algorithm based on the observation that node based ap- proaches are more suited for wireless ...spanning tree algorithm [10], the BIP ...

22

Efficient Collective Communication for Multi-core NOC Interconnects

Efficient Collective Communication for Multi-core NOC Interconnects

... interesting algorithm for implementing broadcast was proposed in ...the algorithm, the source node sends the message halfway across the linear array, partitioning the network into two ...loosely ...

57

Tree based symmetric key broadcast encryption

Tree based symmetric key broadcast encryption

... Broadcast Encryption (BE) deals with the problem of broadcasting encrypted data. For each transmission (or session), there is a set of privileged users who should be able to decrypt the data and a set of revoked ...

40

Tree  Based  Symmetric  Key  Broadcast  Encryption

Tree Based Symmetric Key Broadcast Encryption

... Broadcast Encryption (BE) deals with the problem of broadcasting encrypted data. For each transmission (or session), there is a set of privileged users who should be able to decrypt the data and a set of revoked ...

37

Fast vector Quantization of Color Image Coding with Single Codebook based on Orthogonal Polynomials

Fast vector Quantization of Color Image Coding with Single Codebook based on Orthogonal Polynomials

... Transformed Tree structure Codeword Matching (TTCM) algorithm to find closest codeword of input vector ...TTCM algorithm, the threshold value is set to ...TTCM algorithm for various codebook ...

7

Using Four Learning Algorithms for Evaluating Questionable Uniform Resource Locators (URLs)

Using Four Learning Algorithms for Evaluating Questionable Uniform Resource Locators (URLs)

... Online learning algorithms like Perceptron, Logistic Regression with Stochastic Gradient Descent, Passive Aggressive (PA) Algorithm and Confidence Weighted (CW) Algorithms can be used to detect malicious URLs. ...

22

The Minimum Steiner Tree Problem Based on Genetic Algorithm

The Minimum Steiner Tree Problem Based on Genetic Algorithm

... Genetic Algorithm is a method of searching the optimal solution by using computer to simulate Darwin's biological evolution theory based on natural selection and genetic principles of biological evolution ...

5

Performance Analysis of Decision Tree Algorithms on Mushroom Dataset

Performance Analysis of Decision Tree Algorithms on Mushroom Dataset

... Hoeffding Tree Algorithm: Hoeffding Tree uses a statistical method called the Hoeffding bound or additive Cher off bound to decide the splitting criterion of the attribute while constructing the ...

11

An Incremental Parallel PGAS-based Tree Search Algorithm

An Incremental Parallel PGAS-based Tree Search Algorithm

... parallel tree search algorithms for solving combinatorial ...multicore tree search in Chapel is equivalent to C-OpenMP in terms of performance and programmability, its productivity- aware features for ...

9

An Approximate Algorithm for the Steiner Tree Problem based on Ant Colony Algorithm

An Approximate Algorithm for the Steiner Tree Problem based on Ant Colony Algorithm

... optimization algorithm with data parallelism to solve STP. The algorithm uses the Gunrock graph processing library and the correlation function in CUDA to implement the data parallelism in the path search ...

6

Classifying High-Speed Data Streams Using Statistical Decision Trees

Classifying High-Speed Data Streams Using Statistical Decision Trees

... VFDT algorithm to fast converge when choosing an node ...behavior based in the mean, standard deviation, and a hypotheses test, employing some ideas presented by Ribeiro et ...original algorithm uses ...

10

Title: Efficient Approach for Mining of High Utility Itemsets from Transactional Database

Title: Efficient Approach for Mining of High Utility Itemsets from Transactional Database

... pattern tree (FP-tree) structure, an extended prefix tree structure for storing crucial information about frequent patterns into compressed structure and develop an efficient FP-tree ...

6

X Hamiltonian Surface Broadcast Algorithm

X Hamiltonian Surface Broadcast Algorithm

... Wormhole routing has been widely accepted as the predominant switching mechanism in current multicom- puter systems. One of the efficient message routing algorithms of multicomputers is wormhole-switching. The wormhole ...

11

Realization of the Linear Tree that Corresponds to a Fundamental Loop Matrix

Realization of the Linear Tree that Corresponds to a Fundamental Loop Matrix

... ordering of the branches of the linear tree is now reduced to the ordering of the branches for each linear sub-tree. The solution of this problem is depending on the follow- ing Theorem 7, where it is ...

6

OPTIMIZING THE REDUNDANCY USING CHORUS IN WIRELESS NETWORKS

OPTIMIZING THE REDUNDANCY USING CHORUS IN WIRELESS NETWORKS

... efficient broadcast protocol [1] is ...new broadcast protocol, Called Chorus, based on a MAC/PHY layer [2] that adopts CSMA with collision resolution (CSMA/CR) ...

8

Worldwide Genomic Diversity of the High-Risk Human Papillomavirus Types 31, 35, 52, and 58, Four Close Relatives of Human Papillomavirus Type 16

Worldwide Genomic Diversity of the High-Risk Human Papillomavirus Types 31, 35, 52, and 58, Four Close Relatives of Human Papillomavirus Type 16

... variants based on a 503-bp segment of the LCR. The large tree is based on the UPGMA, and the small tree is based on the neighbor-joining ...UPGMA tree represents all isolates, ...

11

A New Algorithm for Broadcast Storm Reduction in VANETs

A New Algorithm for Broadcast Storm Reduction in VANETs

... new algorithm. In this paper we propose a new idea for broadcast storm reduction based on ...new algorithm named EB or Efficient Broadcast ...clustering algorithm for reducing ...

5

A New Delay Constrained Multicast Routing Algorithm Based on Shared Edges

A New Delay Constrained Multicast Routing Algorithm Based on Shared Edges

... routing algorithm is one of the key technologies to achieve mul- ticast communication, to build a good performance mul- ticast tree often become the best choice for multicast routing ...routing ...

5

Cluster tree topology construction method based on PSO algorithm to prolong the lifetime of ZigBee wireless sensor networks

Cluster tree topology construction method based on PSO algorithm to prolong the lifetime of ZigBee wireless sensor networks

... coordinator nodes powered by stable power supply, routers and end-devices are generally powered by dry batteries or storage batteries. The end-devices send data directly or through routers to the coordinator, and the low ...

13

Learning Multi-Tree Classification Models with Ant Colony Optimization

Learning Multi-Tree Classification Models with Ant Colony Optimization

... multi- tree models, is that it did not performed, overall, bet- ter than ...decision tree induction ...internal tree node, and its at- tribute values become branches to split the training set into ...

12

Show all 10000 documents...

Related subjects