「algorithms」の共起表現一覧(1語右で並び替え)3ページ目

algorithms

<前へ 1 2 3

1語右で並び替え

該当件数:518件

  • intelligence with the development of search algorithms such as Lifelong Planning A* (LPA*), D* Lite
  • high accuracy (centimetre-level) positioning algorithms suitable for surveying and geodesy applicati
  • The cryptographic algorithms supported by CryptoGraf include AES, RSA and
  • It was popularized by the canonical algorithms textbook Introduction to Algorithms by Corme
  • g the efficient derivation of linear algebra algorithms that are provably correct.
  • ore, much effort is devoted to the design of algorithms that minimize the occurrence of collisions f
  • munications network topology for distributed algorithms that require each node of the distributed sy
  • of the Internet, there is a need to develop algorithms that do not require any centralized control
  • In machine learning, one aims to construct algorithms that are able to learn to predict a certain
  • algorithms that perform well on "random" instances (e.g
  • The algorithms that are used for constructing decision tree
  • d search engine ranking due to link-counting algorithms that search engines use.
  • e tiers of storage are governed by automated algorithms that allow Bluejet to place data on the appr
  • telligence and music; he writes programs and algorithms that can analyze existing music and create n
  • Heuristic algorithms that can solve the problem in polinomial tim
  • me for the ZX Spectrum, used actual physical algorithms that were probably simplified versions of th
  • Byzantine fault tolerant protocols are algorithms that are robust to arbitrary types of failur
  • n Interpretation) project currently develops algorithms that tag events and time expressions in natu
  • The Hungarian algorithm is one of many algorithms that have been devised that solve the linear
  • approximation algorithms that run in polynomial time and find a solut
  • search engine delivered blog posts based on algorithms that combine semantic matching with authorit
  • Well-known software algorithms that can be seen as soft sensors include e.g
  • more sophisticated endpoints and meaningful algorithms that extend well beyond basic heart and resp
  • Enologix created the first algorithms that predict wines market performance, inclu
  • ess can often appear inefficient compared to algorithms that are more sequential, MapReduce can be a
  • is is a generic cryptanalytic attack against algorithms that rely on three operations: modular addit
  • y modern drives have internal error recovery algorithms that can take upwards of a minute to recover
  • he concerns are a new generation of computer algorithms that amass known information about a user, t
  • They have turned to fuzzy logic and designed algorithms that can analyze snapshots of pizzas from di
  • ded mathematical abstractions for expressing algorithms; the lambda calculus remains influential in
  • including the discovery of the first quantum algorithms, the theory of quantum logic gates and quant
  • Like other algorithms, the Banker's algorithm has some limitations
  • In the analysis of algorithms, the master theorem provides a cookbook solu
  • For parallel algorithms the algorithmic theory that has the largest
  • The algorithms then score and sort the completed phylogenet
  • His research interests include Algorithms, Theoretical Computer Science and Discrete M
  • Unlike other clustering algorithms this does not require choosing the number of
  • ffort to develop one or more additional hash algorithms through a public competition, similar to the
  • ines many external programs and internalized algorithms to direct an author of a new structure or a
  • gs the leading engines made changes to their algorithms to allow fresh content to rank quickly withi
  • ll as in extending computational linguistics algorithms to bioinformatics.
  • ners use these airfare observations to build algorithms to predict future airfare price movements.
  • roprietary flow-control and error-correction algorithms to achieve reliable delivery of data and avo
  • pecific programming languages that can allow algorithms to be easily adapted to multiple different t
  • s with these features by developing computer algorithms to solve these models.
  • e guidelines contain decision or computation algorithms to be followed.
  • els and as a computer scientist he developed algorithms to run record-breaking simulations on partic
  • The study of algorithms to automatically discover interpretations of
  • ombine several of the best of Folding@Home's algorithms to accurately predict the folded structure o
  • is committed to bringing the latest software algorithms to the user free of charge (Extended GCG or
  • gie). His group successfully applied the new algorithms to challenging problems such as aerodynamic
  • fully generalizes MetaPost path construction algorithms to three dimensions, and compiles commands i
  • One of the most commonly used algorithms to generate unstructured quadrilateral grid
  • Multi-Infrared detectors make use of algorithms to suppress the effects of background radiat
  • The idea of using sophisticated algorithms to assess the quality of the welds produced
  • re firm in Australia used their software and algorithms to crack the puzzle.
  • It involves adaptive array processing algorithms to aid in target detection.
  • project is the testing and evaluating of new algorithms to predict both known and unknown protein st
  • Healia's search engine uses algorithms to assess quality and to categorize Web docu
  • bol uses association, ranking and clustering algorithms to analyze related keywords or web pages.
  • FDR2 applies various state-space compression algorithms to the process LTSs in order to reduce the s
  • , and QCC, Quadratic Compression Conversion, algorithms to identify multiple isotopes in realtime an
  • omputer science, and more specifically graph algorithms, to represent the triconnected components of
  • ter's 1993 article "Differential Compression Algorithms", which adapts Bridges' algorithms to genera
  • This can easily confound molecular clock algorithms to the point where hard polytomies become un
  • ir product applies practical Computer Vision algorithms to the problem of gesture recognition in a w
  • ses carefully engineered data structures and algorithms to achieve very low per-node overheads and h
  • harting subsurface images of the earth using algorithms to predict what a regular sampling of data w
  • let/visible energy and this is converted via algorithms to determine chemical concentrations.
  • areer has been centered around the design of algorithms, together with work on computational complex
  • Parallel algorithms typically take different approaches than BFS
  • Some clustering algorithms use single-linkage clustering, constructing
  • The more advanced algorithms use the full Knott-Zoeppritz equations and t
  • Different algorithms use different formulae for measuring "best".
  • More sophisticated algorithms use some method of preventing the walker fro
  • nt Lidar guns have different pulse rates and algorithms used to defeat laser jammers and/or detect t
  • Clarifications of the actual algorithms used by BitTyrant follow.
  • ly the human appearance is important but the algorithms used for its control require flexibility and
  • University Computing Laboratory devised the algorithms used by the tool and Michael Goldsmith was i
  • It was one of the first non-heuristic algorithms used in diff.
  • using different layout styles, mathematical algorithms used in graph drawing.
  • The algorithms used by NOVAS are based on vector astrometry
  • The algorithms used in these cases are analogous to the for
  • he Astronomical Applications Department, the algorithms used in NOVAS are identical to those used in
  • nguages that allow the expression of quantum algorithms using high-level constructs.
  • It is often in contrast to move-generation algorithms using a Directed Acyclic Word Graph (DAWG),
  • It designs and analyzes quantum computing algorithms, using Quantum Monte Carlo techniques.
  • In speech recognition, algorithms utilizing trigram-tagger score better those
  • The underlying data model and retrieval algorithms were deeply influenced by David Child's Set
  • rn recognition, image storage and comparison algorithms were available.
  • se of their Commodore counterparts, the hash algorithms were different, presumably to prevent entry
  • Those same algorithms were later published in an article by Bridge
  • nd attitude determination and control system algorithms were provided by Space Systems/Loral.
  • roblems with floorplans have polynomial time algorithms when restricted to sliceable floorplans.
  • appear in the analysis of divide and conquer algorithms where the sub-problems have substantially di
  • most important for radix-2 Cooley-Tukey FFT algorithms, where the recursive stages of the algorithm
  • life type systems from conventional genetic algorithms where the GA performs replication "artificia
  • audio generators, detectors, and processing algorithms, which meet or exceed ITU specifications.
  • cation utilizes several techniques (known as algorithms) which rely on the detector's ability to dis
  • ormance, as well as the Einstein@Home search algorithms which have been improved from run to run, ac
  • rfaces are extracted with fast and efficient algorithms which make use of the efficient data layout.
  • This notion is common in various search algorithms which are described in terms of search graph
  • cheme) leads to compute and memory-efficient algorithms, which are especially adapted for transient
  • a technical effect are described by control algorithms, which may or may not utilize formal methods
  • phs within a given graph using probabilistic algorithms, which can then be derandomized and turned i
  • the operation of robot programs and control algorithms, while plotting instantaneous joint accelera
  • Many edge-detection algorithms will pick up two adjacent edges: the transit
  • problems in computational geometry allow for algorithms with better computational complexity when re
  • Variants of the method use standard genetic algorithms with a defined objective function to swap hi
  • Icon and Downloading Pixels use a system of algorithms with basic image data to form images. Visito
  • modules, and coauthored the book "Mastering Algorithms with Perl.
  • Principles of data structures and algorithms with Pascal ((William C. Brown Publ.,1987).
  • There exist many sorting algorithms with substantially better worst-case or aver
  • io playback routines, and effects processing algorithms within a Java framework that allows for easy
  • ay tracing and related geometry and graphics algorithms work.
  • the organism, form the basis upon which such algorithms work.
  • , text and natural language processing (NLP) algorithms written in Java and arranged into a modular
<前へ 1 2 3