NUK - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources NUK. For full access, REGISTER.

1 2 3 4 5
hits: 2,128
11.
  • AdaRisk: Risk-adaptive Deep... AdaRisk: Risk-adaptive Deep Reinforcement Learning for Vulnerable Nodes Detection
    Li, Fan; Xu, Zhiyu; Cheng, Dawei ... IEEE transactions on knowledge and data engineering, 06/2024
    Journal Article
    Peer reviewed

    Vulnerable node detection in uncertain graphs is a typical graph mining problem that seeks to identify nodes at a high risk of breakdown under the joint effect from both the self and contagion risk ...
Full text
12.
  • Multi-objective ship path p... Multi-objective ship path planning using non-dominant relationship-based WOA in marine meteorological environment
    Han, Qilong; Yang, Xiao; Song, Hongtao ... Ocean engineering, 12/2022, Volume: 266
    Journal Article
    Peer reviewed

    Marine environmental issues have become increasingly prominent in recent years, and ocean transportation has also received extensive attention. Relevant personnel is concerned about the minimum fuel ...
Full text
13.
  • GMMCP tracker: Globally opt... GMMCP tracker: Globally optimal Generalized Maximum Multi Clique problem for multiple object tracking
    Dehghan, Afshin; Assari, Shayan Modiri; Shah, Mubarak 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 06/2015
    Conference Proceeding

    Data association is the backbone to many multiple object tracking (MOT) methods. In this paper we formulate data association as a Generalized Maximum Multi Clique problem (GMMCP). We show that this ...
Full text
14.
  • The Hafnian Master Theorem The Hafnian Master Theorem
    Kocharovsky, Vitaly V.; Kocharovsky, Vladimir V.; Tarasov, Sergey V. Linear algebra and its applications, 10/2022, Volume: 651
    Journal Article
    Peer reviewed
    Open access
Full text
15.
  • Quadratic Optimization With... Quadratic Optimization With Similarity Constraint for Unimodular Sequence Synthesis
    Guolong Cui; Xianxiang Yu; Foglia, Goffredo ... IEEE transactions on signal processing, 09/2017, Volume: 65, Issue: 18
    Journal Article
    Peer reviewed
    Open access

    This paper considers unimodular sequence synthesis under similarity constraint for both the continuous and discrete phase cases. A computationally efficient iterative algorithm for the continuous ...
Full text

PDF
16.
  • Matching cut: Kernelization... Matching cut: Kernelization, single-exponential time FPT, and exact exponential algorithms
    Komusiewicz, Christian; Kratsch, Dieter; Le, Van Bang Discrete Applied Mathematics, 09/2020, Volume: 283
    Journal Article
    Peer reviewed
    Open access

    In a graph, a matching cut is an edge cut that is a matching. Matching Cut, which is known to be NP-complete, is the problem of deciding whether or not a given graph G has a matching cut. In this ...
Full text

PDF
17.
  • A Novel Algorithm for Findi... A Novel Algorithm for Finding Reducts With Fuzzy Rough Sets
    Chen, Degang; Zhang, Lei; Zhao, Suyun ... IEEE transactions on fuzzy systems, 2012-April, 2012-04-00, Volume: 20, Issue: 2
    Journal Article
    Peer reviewed

    Attribute reduction is one of the most meaningful research topics in the existing fuzzy rough sets, and the approach of discernibility matrix is the mathematical foundation of computing reducts. When ...
Full text
18.
  • GSI: GPU-friendly Subgraph Isomorphism
    Zeng, Li; Zou, Lei; Ozsu, M. Tamer ... 2020 IEEE 36th International Conference on Data Engineering (ICDE), 2020-April
    Conference Proceeding
    Open access

    Subgraph isomorphism is a well-known NP-hard problem that is widely used in many applications, such as social network analysis and querying over the knowledge graph. Due to the inherent hardness, its ...
Full text

PDF
19.
  • A novel evolutionary approa... A novel evolutionary approach for load balanced clustering problem for wireless sensor networks
    Kuila, Pratyay; Gupta, Suneet K.; Jana, Prasanta K. Swarm and evolutionary computation, October 2013, 2013-10-00, Volume: 12
    Journal Article
    Peer reviewed

    Clustering sensor nodes is an effective topology control method to reduce energy consumption of the sensor nodes for maximizing lifetime of Wireless Sensor Networks (WSNs). However, in a cluster ...
Full text
20.
  • The Mobile Sensor Deploymen... The Mobile Sensor Deployment Problem and the Target Coverage Problem in Mobile Wireless Sensor Networks are NP-Hard
    Nguyen, Ngoc-Tu; Liu, Bing-Hong IEEE systems journal, 2019-June, 2019-6-00, 20190601, Volume: 13, Issue: 2
    Journal Article
    Peer reviewed

    Recently, the problem of scheduling mobile sensors to cover all targets and maintain network connectivity such that the total movement distance is minimized, termed the mobile sensor deployment (MSD) ...
Full text
1 2 3 4 5
hits: 2,128

Load filters