A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2013; you can also visit the original URL.
The file type is application/pdf
.
Filters
Parameterized Analysis of Paging and List Update Algorithms
2013
Algorithmica
It is well-established that input sequences for paging and list update have locality of reference. ...
We obtain similar separation for list update algorithms. ...
Parameterized Analysis of List Update Algorithms In this section we study the parameterized complexity of list update algorithms in terms of locality of reference. ...
doi:10.1007/s00453-013-9800-5
fatcat:v7vlp5al7jdrjihan6dctcc2yu
Parameterized Analysis of Paging and List Update Algorithms
[chapter]
2010
Lecture Notes in Computer Science
It is well-established that input sequences for paging and list update have locality of reference. ...
We obtain similar separation for list update algorithms. ...
Parameterized Analysis of List Update Algorithms In this section we study the parameterized complexity of list update algorithms in terms of locality of reference. ...
doi:10.1007/978-3-642-12450-1_10
fatcat:xggvwcharfd5bloxqanmkbej2q
On Developing New Models, with Paging as a Case Study
2010
ACM SIGACT News
in developing models and measures that better reflect actual practice for the case of paging. ...
In this paper we discuss first certain shortcomings of the online competitive analysis model particularly as it concerns paging, discuss existing solutions in the literature as well as present recent progress ...
(and by extension list update algorithms, e.g. ...
doi:10.1145/1711475.1714372
fatcat:hg65vtitcjfuvokc2db2gtgefu
Reinforcement Learning to Rank in E-Commerce Search Engine: Formalization, Analysis, and Application
[article]
2018
arXiv
pre-print
Lastly, we propose a novel policy gradient algorithm for learning an optimal ranking policy, which is able to deal with the problem of high reward variance and unbalanced reward distribution of an SSMDP ...
The results demonstrate that our algorithm performs much better than online LTR methods, with more than 40% and 30% growth of total transaction amount in the simulation and the real application, respectively ...
ACKNOWLEDGMENTS We would like to thank our colleague âĹŠ Yusen Zhan for useful discussions and supports of this work. ...
arXiv:1803.00710v3
fatcat:mvf3tuhkprfhpcz6ojgousfqk4
Parameterized reconstruction with random scales for radio synthesis imaging
2020
Astronomy and Astrophysics
Before the astrophysical analysis, the effects of the dirty beam need to be eliminated, which can be solved with various deconvolution methods. Aims. ...
used deconvolution algorithms. ...
We would like to thank the people who have worked and are working on Python, RASCIL and CASA projects, which together built an excellent development and simulation environment. This work was ...
doi:10.1051/0004-6361/202039275
fatcat:tmgvzeyccfbrxa3gdo5rl4tuxm
Vulnerability detection and prevention of SQL injection
2018
International Journal of Engineering & Technology
There are different defence methods are used to prevent such as, parameterized statement, stored procedures and white list input validation. ...
The comparison of these methods used for detection and prevention vulnerability in web server. ...
Acknowledgment First of all we would like to express our sincere thanks to Mata Amritanandamayi Devi (Amma) for her inspiration and guidance both in unseen and unconcealed ways. ...
doi:10.14419/ijet.v7i2.31.13388
fatcat:wc2kpsxjdbfonjjb4werw2ddzq
Constrained Monotonic Abstraction: A CEGAR for Parameterized Verification
[chapter]
2010
Lecture Notes in Computer Science
Our CEGAR algorithm automatically extracts from each spurious counterexample a set of configurations called a "Safety Zone" and use it to refine the abstract transition system of the next iteration. ...
for parameterized systems. ...
Introduction We investigate the analysis of safety properties for parameterized systems. ...
doi:10.1007/978-3-642-15375-4_7
fatcat:eebqhyi6lrgctlcmwb7j5jlucq
Synergy of Nuclear Data and Nuclear Theory Online
2020
EPJ Web of Conferences
programs for modeling of nuclear properties and nuclear dynamics. ...
Advantages of the functioning scheme of the knowledge base provide the synergy of coexistence of the experimental data and computational codes within one platform. ...
algorithms that describe the properties of nuclei and the processes of nuclear dynamics at low and intermediate energies, e.g ...
doi:10.1051/epjconf/202023903021
fatcat:aapky2jiqvfipmuraqec57an5i
UMass Amherst and UT Austin @ the TREC 2009 Relevance Feedback Track
2009
Text Retrieval Conference
In contrast, we adapt the AdaRank learning algorithm [Xu and Li, 2007] to simultaneously estimate parameterization of all feedback terms. ...
While not evaluated here, the method can be more generally applied for joint estimation of both query and feedback terms. ...
Any opinions, findings and conclusions or recommendations expressed in this material are the authors and do not necessarily reflect those of the sponsors. ...
dblp:conf/trec/CartrightSL09
fatcat:wgbxmmwqlffj3opjp4i65ejora
Malicious script distribution pattern detection technique for image search websites
2022
Journal of Electronic Imaging (JEI)
Due to the malware spread through web pages, privacy theft and infringement are getting serious and DoS attacks happen frequently. ...
Distribution patterns of hidden malicious codes on the image search website were collected, and patterns of collected malicious codes and malicious scripts were analyzed. ...
1 1 6 ; 3 9 0 Importance ¼ 1 − number of detected web pages number of total white list : Step 2: We can detect many types of malicious distribution patterns from most of the malicious web pages. ...
doi:10.1117/1.jei.31.3.033046
fatcat:t3jo6jg4g5dqdpbt6evdf5rdse
The unsupervised discovery of trends is often not sufficient, either due to inadequacies in the trend analysis algorithm, or because the data collection itself does not possess all of the information to ...
The surfacing of trends from data collections such as usergenerated content streams and news articles is a popular and important data analysis activity, used in applications such as business intelligence ...
Action Processor: This module performs the action, updates the subplots, and calls the Action Suggestion Backend to update the list of suggestions. ...
doi:10.1145/2939502.2939514
dblp:conf/sigmod/KamatWN16
fatcat:6sl3563v75evtmpxbzf7pp6fua
Parameterized context windows in Random Indexing
2016
Proceedings of the 1st Workshop on Representation Learning for NLP
The parameterization introduces position specific weights in the context windows, and the approach is shown to improve the performance in both word similarity and sentiment classification tasks. ...
This paper introduces a parameterization for word embeddings produced by the Random Indexing framework. ...
and non-updated embeddings. ...
doi:10.18653/v1/w16-1619
dblp:conf/rep4nlp/NorlundNS16
fatcat:4vnenfqi7jcefomgxkv7raqeue
Dynamic Clustering in Object-Oriented Databases: An Advocacy for Simplicity
[chapter]
2001
Lecture Notes in Computer Science
These three clustering algorithm have been implemented in the Texas persistent object store and compared in terms of clustering efficiency (i.e., overall performance increase) and overhead using the Object ...
The third clustering technique, called Detection & Reclustering of Objects (DRO), is based on the same principles, but is much simpler to implement. ...
Eventually, the object clustering algorithm initially builds a list of candidate pages containing objects related to the current object. To build this list, the database schema must be known. ...
doi:10.1007/3-540-44677-x_5
fatcat:mnlvg65fwjftjg3kh7nwgzsy3a
Big data security access control algorithm based on memory index acceleration in WSNs
2020
EURASIP Journal on Wireless Communications and Networking
In our experiments, under the same test environment and security strategy, the performance has been greatly improved with the proposed algorithm. ...
This paper first analyzes the data processing flow of the traditional access control strategy in big data systems, analyzes its time complexity, and explores how it affects system performance. ...
Acknowledgements The authors acknowledged the anonymous reviewers and editors for their efforts in valuable comments and suggestions. ...
doi:10.1186/s13638-020-01725-1
fatcat:7hmotfud2vak5n57ay2vfymldq
Elix can automatically and correctly discover links that are exposed by an app, and many others that are not explicitly exposed, thus increasing coverage of both link-enabled apps and link-enabled pages ...
Elix can extract 80-90% of an app's links, and above 80% of the extracted links are stable. ...
ACKNOWLEDGMENTS We thank our shepherd, Lin Zhong, and the anonymous reviewers for their feedback. ...
doi:10.1145/3307334.3326102
dblp:conf/mobisys/HuRNN19
fatcat:pbk3o2js4bh2rgronqnyz5egae
« Previous
Showing results 1 — 15 out of 15,930 results