نتایج جستجو برای: enumeration technique

تعداد نتایج: 622577  

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده فنی 1393

a problem of computer vision applications is to detect regions of interest under dif- ferent imaging conditions. the state-of-the-art maximally stable extremal regions (mser) detects affine covariant regions by applying all possible thresholds on the input image, and through three main steps including: 1) making a component tree of extremal regions’ evolution (enumeration), 2) obtaining region ...

Journal: :international journal of group theory 2014
colin m. campbell george havas colin ramsay edmund f. robertson

‎there is much interest in finding short presentations for the finite‎ ‎simple groups‎. ‎indeed it has been suggested that all these groups are‎ ‎efficient in a technical sense‎. ‎in previous papers we produced nice‎ ‎efficient presentations for all except one of the simple groups with‎ ‎order less than one million‎. ‎here we show that all simple groups with‎ ‎order between $1$ million and $5$ ...

Journal: :PVLDB 2015
Lijun Chang Xuemin Lin Wenjie Zhang Jeffrey Xu Yu Ying Zhang Lu Qin

Driven by many real applications, graph pattern matching has attracted a great deal of attention recently. Consider that a twigpattern matching may result in an extremely large number of matches in a graph; this may not only confuse users by providing too many results but also lead to high computational costs. In this paper, we study the problem of top-k tree pattern matching; that is, given a ...

Journal: :CoRR 2012
R. D. Ogden

We provide an efficient encoding of the natural numbers {0,1,2,3,...} as strings of nested parentheses {(),(()),(()()),((())),...}, or considered inversely, an efficient enumeration of such strings. The technique is based on the recursive definition of the Catalan numbers. The probability distributions arising from this encoding are explored. Applications of this encoding to prefix-free data en...

Journal: :Lecture Notes in Computer Science 2023

The Demirci-Selçuk meet-in-the-middle (DS-MITM) attack is a sophisticated variant of differential attacks. Due to its sophistication, it hard efficiently find the best DS-MITM attacks on most ciphers except for AES. Moreover, current automatic tools only capture basic version attacks, and critical techniques developed enhancing (e.g., enumeration key-dependent-sieve) still rely manual work. In ...

Journal: :Journal of Structural and Construction Engineering (Transactions of AIJ) 2011

Journal: :CoRR 2016
Amit Gurung Rajarshi Ray

An efficient algorithm to enumerate the vertices of a two-dimensional (2D) projection of a polytope, is presented in this paper. The proposed algorithm uses the support function of the polytope to be projected and enumerated for vertices. The complexity of our algorithm is linear in the number of vertices of the projected polytope and we show empirically that the performance is significantly be...

Journal: :Notre Dame Journal of Formal Logic 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید