|
|
|
Zheng Lyu, Qun Sun, Jingzhen Ma, Qing Xu, Yuanfu Li and Fubing Zhang
Residential areas and road networks have a strong geographical correlation. The development of a single geographical feature could destroy the geographical correlation. It is necessary to establish collaborative generalization models suitable for multipl...
ver más
|
|
|
|
|
|
|
Erick Rodríguez-Hernández, Juan Irving Vasquez, Carlos Alberto Duchanoy Martínez and Hind Taud
A policy determines the action that an autonomous car needs to take according to its current situation. For example, the car keeps itself on track or overtakes another car, among other policies. Some autonomous cars could need more than one policy to dri...
ver más
|
|
|
|
|
|
|
Justin L. Wang, Hanqi Zhuang, Laurent Chérubin, Ali Muhamed Ali and Ali Ibrahim
A divide-and-conquer (DAC) machine learning approach was first proposed by Wang et al. to forecast the sea surface height (SSH) of the Loop Current System (LCS) in the Gulf of Mexico. In this DAC approach, the forecast domain was divided into non-overlap...
ver más
|
|
|
|
|
|
|
Virginia Niculescu,Darius Bufnea,Adrian Sterca
Pág. 197 - 206
This paper details an extension of a Java parallel programming framework ? JPLF. The JPLF framework is a programming framework that helps programmers build parallel programs using existing building blocks. The framework is based on {\em PowerLi...
ver más
|
|
|
|
|
|
|
Mario Coutino, Sundeep Prabhakar Chepuri, Takanori Maehara and Geert Leus
To analyze and synthesize signals on networks or graphs, Fourier theory has been extended to irregular domains, leading to a so-called graph Fourier transform. Unfortunately, different from the traditional Fourier transform, each graph exhibits a differe...
ver más
|
|
|
|
|
|
|
Yati Phyo, Moe Nandi Aung, Canh Minh Do and Kazuhiro Ogata
Termination or halting is an important system requirement that many systems should satisfy and can be expressed in linear temporal logic as eventual properties. We devised a divide-and-conquer approach to eventual model checking in order to reduce the st...
ver más
|
|
|
|
|
|
|
Quentin Marécat and Matthieu Saubanère
The performance of embedding methods is directly tied to the quality of the bath orbital construction. In this paper, we develop a versatile framework, enabling the investigation of the optimal construction of the orbitals of the bath. As of today, in st...
ver más
|
|
|
|
|
|
|
Zuleika Nascimento and Djamel Sadok
-
|
|
|
|
|
|
|
Zuleika Nascimento and Djamel Sadok
Network traffic classification aims to identify categories of traffic or applications of network packets or flows. It is an area that continues to gain attention by researchers due to the necessity of understanding the composition of network traffics, wh...
ver más
|
|
|
|
|
|
|
Joonas Hämäläinen, Tommi Kärkkäinen and Tuomo Rossi
Two new initialization methods for K-means clustering are proposed. Both proposals are based on applying a divide-and-conquer approach for the K-means? type of an initialization strategy. The second proposal also uses multiple lower-dimensional subspaces...
ver más
|
|
|
|
|
|
|
Jose Valles, Gerald Corzo and Dimitri Solomatine
Hydrological models are based on the relationship between rainfall and discharge, which means that a poor representation of rainfall produces a poor streamflow result. Typically, a poor representation of rainfall input is produced by a gauge network that...
ver más
|
|
|
|
|
|
|
Ying-Che Hung and Liang-Yü Chen
Traditional electoral districting is mostly carried out by artificial division. It is not only time-consuming and labor-intensive, but it is also difficult to maintain the principles of fairness and consistency. Due to specific political interests, objec...
ver más
|
|
|
|
|
|
|
Wensheng Chen, Yinxi Niu, Zhenhua Gan, Baoping Xiong and Shan Huang
Enhancing information representation in electromyography (EMG) signals is pivotal for interpreting human movement intentions. Traditional methods often concentrate on specific aspects of EMG signals, such as the time or frequency domains, while overlooki...
ver más
|
|
|
|
|
|
|
Xiaotong Cui, Hongxin Zhang, Xing Fang, Yuanzhen Wang, Danzhi Wang, Fan Fan and Lei Shu
The leakage signals, including electromagnetic, energy, time, and temperature, generated during the operation of password devices contain highly correlated key information, which leads to security vulnerabilities. In traditional encryption algorithms, th...
ver más
|
|
|
|
|
|
|
Guannan Li, Xiu Lu, Bingxian Lin, Liangchen Zhou and Guonian Lv
In order to realize the management of various street objects in smart cities and smart transportation, it is very important to determine their geolocation. Current positioning methods of street-view images based on mobile mapping systems (MMSs) mainly re...
ver más
|
|
|
|
|
|
|
Stefano Quer, Andrea Marcelli and Giovanni Squillero
The maximum common subgraph of two graphs is the largest possible common subgraph, i.e., the common subgraph with as many vertices as possible. Even if this problem is very challenging, as it has been long proven NP-hard, its countless practical applicat...
ver más
|
|
|
|