نتایج جستجو برای: token based algorithm

تعداد نتایج: 3349700  

2014
Wuying Liu Lin Wang Mianzhu Yi

Multiclass text classification (MTC) is a challenging issue and the corresponding MTC algorithms can be used in many applications. The space-time overhead of the algorithms must be concerned about the era of big data. Through the investigation of the token frequency distribution in a Chinese web document collection, this paper reexamines the power law and proposes a simple-random-sampling-based...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1388

assigning premium to the insurance contract in iran mostly has based on some old rules have been authorized by government, in such a situation predicting premium by analyzing database and it’s characteristics will be definitely such a big mistake. therefore the most beneficial information one can gathered from these data is the amount of loss happens during one contract to predicting insurance ...

Journal: :Theor. Comput. Sci. 2014
Katsuhisa Yamanaka Erik D. Demaine Takehiro Ito Jun Kawahara Masashi Kiyomi Yoshio Okamoto Toshiki Saitoh Akira Suzuki Kei Uchizawa Takeaki Uno

Consider a puzzle consisting of n tokens on an n-vertex graph, where each token has a distinct starting vertex and a distinct target vertex it wants to reach, and the only allowed transformation is to swap the tokens on adjacent vertices. We prove that every such puzzle is solvable in O(n) token swaps, and thus focus on the problem of minimizing the number of token swaps to reach the target tok...

Journal: :Theor. Comput. Sci. 1997
Johannes Gehrke C. Greg Plaxton Rajmohan Rajaraman

We consider the problem of load balancing in a ring network. We present an analysis of the following local algorithm. In each step, each node of the ring examines the number of tokens at its clockwise neighbor and sends a token to the neighbor if the neighbor has fewer tokens. We show that in a synchronous model, for any initial token distribution b on an n-node ring, the algorithm converges to...

2006
Marc Segal

This is a summary of the paper ”The Stabilizing Token Ring in Three Bits” / Mohamed G.Gouda and F. Furman Haddix. The paper describes a determinstic algorithm for a selfstabilizing unidirectional token ring in which each process has a fixed number of states which is not depenent on the number of processes. In particular, the state of each one of the processes is represented by three bits. The a...

1998
Hussein M. Abdel-Wahab Alaa Youssef Kurt Maly

Collaborative multimedia systems encompass many Internet applications such as desk-top conferencing and interactive distance learning. These applications often contain resources , such as audio, video and shared applications, that must be accessed exclusively by one participant at a time. In this paper, we present a distributed algorithm that manages the access to these exclusive resources. The...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی - دانشکده اقتصاد 1389

this thesis is a study on insurance fraud in iran automobile insurance industry and explores the usage of expert linkage between un-supervised clustering and analytical hierarchy process(ahp), and renders the findings from applying these algorithms for automobile insurance claim fraud detection. the expert linkage determination objective function plan provides us with a way to determine whi...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه یزد 1390

موضوع پایان نامه به خزش و رتبه بندی صفحات وب اختصاص داده شده است. خزش و رتبه بندی از بخش های مهم در موتور های جستجو می باشند که به ترتیب وظیفه ی بارگذاری صفحات با کیفیت و رتبه بندی نتایج بازگشتی به کاربر را بر عهده دارند. تا کنون الگوریتم های خزش متنوعی پیشنهاد شده اند، اما یا بازدهی مناسبی نداشته اند یا از پیچیدگی بالایی برخوردار هستند. لذا الگوریتم خزش کارایی به نام ieca(intelligent effective...

2011
Colin Cooper

The aim of this article is to discuss some applications of random processes in searching and reaching consensus on finite graphs. The topics covered are: Why random walks?, Speeding up random walks, Random and deterministic walks, Interacting particles and voting, Searching changing graphs. As an introductory example consider the self-stabilizing mutual exclusion algorithm of Israeli and Jalfon...

Journal: :J. Parallel Distrib. Comput. 1996
Yong Yan Xiaodong Zhang Haixu Yang

Since this problem was first studied by Lann [8] and Lamport [7], it has been extensively investigated for about 20 years. Many algorithms have been proposed to reduce the number of messages, to minimize the access time to the critical region (CR), or to enhance reliability (e.g., [5, 12, 16, 22, 26, 27]). In general, mutual exclusion algorithms are divided into two classes: the permission-base...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید