Filters








15,930 Hits in 3.8 sec

Parameterized Analysis of Paging and List Update Algorithms

Reza Dorrigiv, Martin R. Ehmsen, Alejandro López-Ortiz
2013 Algorithmica  
It is well-established that input sequences for paging and list update have locality of reference.  ...  We obtain similar separation for list update algorithms.  ...  Parameterized Analysis of List Update Algorithms In this section we study the parameterized complexity of list update algorithms in terms of locality of reference.  ... 
doi:10.1007/s00453-013-9800-5 fatcat:v7vlp5al7jdrjihan6dctcc2yu

Parameterized Analysis of Paging and List Update Algorithms [chapter]

Reza Dorrigiv, Martin R. Ehmsen, Alejandro López-Ortiz
2010 Lecture Notes in Computer Science  
It is well-established that input sequences for paging and list update have locality of reference.  ...  We obtain similar separation for list update algorithms.  ...  Parameterized Analysis of List Update Algorithms In this section we study the parameterized complexity of list update algorithms in terms of locality of reference.  ... 
doi:10.1007/978-3-642-12450-1_10 fatcat:xggvwcharfd5bloxqanmkbej2q

On Developing New Models, with Paging as a Case Study

Reza Dorrigiv, Alejandro López-Ortiz
2010 ACM SIGACT News  
in developing models and measures that better reflect actual practice for the case of paging.  ...  In this paper we discuss first certain shortcomings of the online competitive analysis model particularly as it concerns paging, discuss existing solutions in the literature as well as present recent progress  ...  (and by extension list update algorithms, e.g.  ... 
doi:10.1145/1711475.1714372 fatcat:hg65vtitcjfuvokc2db2gtgefu

Reinforcement Learning to Rank in E-Commerce Search Engine: Formalization, Analysis, and Application [article]

Yujing Hu, Qing Da, Anxiang Zeng, Yang Yu, Yinghui Xu
2018 arXiv   pre-print
Lastly, we propose a novel policy gradient algorithm for learning an optimal ranking policy, which is able to deal with the problem of high reward variance and unbalanced reward distribution of an SSMDP  ...  The results demonstrate that our algorithm performs much better than online LTR methods, with more than 40% and 30% growth of total transaction amount in the simulation and the real application, respectively  ...  ACKNOWLEDGMENTS We would like to thank our colleague âĹŠ Yusen Zhan for useful discussions and supports of this work.  ... 
arXiv:1803.00710v3 fatcat:mvf3tuhkprfhpcz6ojgousfqk4

Parameterized reconstruction with random scales for radio synthesis imaging

L. Zhang, L.G. Mi, M. Zhang X. Liu, L. Xu, F. Wang, Y.J. Ruan, D.Y. Li
2020 Astronomy and Astrophysics  
Before the astrophysical analysis, the effects of the dirty beam need to be eliminated, which can be solved with various deconvolution methods. Aims.  ...  used deconvolution algorithms.  ...  We would like to thank the people who have worked and are working on Python, RASCIL and CASA projects, which together built an excellent development and simulation environment. This work was  ... 
doi:10.1051/0004-6361/202039275 fatcat:tmgvzeyccfbrxa3gdo5rl4tuxm

Vulnerability detection and prevention of SQL injection

B J. Santhosh Kumar, P P. Anaswara
2018 International Journal of Engineering & Technology  
There are different defence methods are used to prevent such as, parameterized statement, stored procedures and white list input validation.  ...  The comparison of these methods used for detection and prevention vulnerability in web server.  ...  Acknowledgment First of all we would like to express our sincere thanks to Mata Amritanandamayi Devi (Amma) for her inspiration and guidance both in unseen and unconcealed ways.  ... 
doi:10.14419/ijet.v7i2.31.13388 fatcat:wc2kpsxjdbfonjjb4werw2ddzq

Constrained Monotonic Abstraction: A CEGAR for Parameterized Verification [chapter]

Parosh Aziz Abdulla, Yu-Fang Chen, Giorgio Delzanno, Frédéric Haziza, Chih-Duo Hong, Ahmed Rezine
2010 Lecture Notes in Computer Science  
Our CEGAR algorithm automatically extracts from each spurious counterexample a set of configurations called a "Safety Zone" and use it to refine the abstract transition system of the next iteration.  ...  for parameterized systems.  ...  Introduction We investigate the analysis of safety properties for parameterized systems.  ... 
doi:10.1007/978-3-642-15375-4_7 fatcat:eebqhyi6lrgctlcmwb7j5jlucq

Synergy of Nuclear Data and Nuclear Theory Online

Audrey Denikm, Alexander Karpov, Mikhail Naumenko, Vladimir Rachkov, Viacheslav Samarin, Vycheslav Saiko, Z. Ge, N. Shu, Y. Chen, W. Wang, H. Zhang
2020 EPJ Web of Conferences  
programs for modeling of nuclear properties and nuclear dynamics.  ...  Advantages of the functioning scheme of the knowledge base provide the synergy of coexistence of the experimental data and computational codes within one platform.  ...  algorithms that describe the properties of nuclei and the processes of nuclear dynamics at low and intermediate energies, e.g  ... 
doi:10.1051/epjconf/202023903021 fatcat:aapky2jiqvfipmuraqec57an5i

UMass Amherst and UT Austin @ the TREC 2009 Relevance Feedback Track

Marc-Allen Cartright, Jangwon Seo, Matthew Lease
2009 Text Retrieval Conference  
In contrast, we adapt the AdaRank learning algorithm [Xu and Li, 2007] to simultaneously estimate parameterization of all feedback terms.  ...  While not evaluated here, the method can be more generally applied for joint estimation of both query and feedback terms.  ...  Any opinions, findings and conclusions or recommendations expressed in this material are the authors and do not necessarily reflect those of the sponsors.  ... 
dblp:conf/trec/CartrightSL09 fatcat:wgbxmmwqlffj3opjp4i65ejora

Malicious script distribution pattern detection technique for image search websites

Yong-joon Lee, Won-shik Na
2022 Journal of Electronic Imaging (JEI)  
Due to the malware spread through web pages, privacy theft and infringement are getting serious and DoS attacks happen frequently.  ...  Distribution patterns of hidden malicious codes on the image search website were collected, and patterns of collected malicious codes and malicious scripts were analyzed.  ...  1 1 6 ; 3 9 0 Importance ¼ 1 − number of detected web pages number of total white list : Step 2: We can detect many types of malicious distribution patterns from most of the malicious web pages.  ... 
doi:10.1117/1.jei.31.3.033046 fatcat:t3jo6jg4g5dqdpbt6evdf5rdse

TrendQuery

Niranjan Kamat, Eugene Wu, Arnab Nandi
2016 Proceedings of the Workshop on Human-In-the-Loop Data Analytics - HILDA '16  
The unsupervised discovery of trends is often not sufficient, either due to inadequacies in the trend analysis algorithm, or because the data collection itself does not possess all of the information to  ...  The surfacing of trends from data collections such as usergenerated content streams and news articles is a popular and important data analysis activity, used in applications such as business intelligence  ...  Action Processor: This module performs the action, updates the subplots, and calls the Action Suggestion Backend to update the list of suggestions.  ... 
doi:10.1145/2939502.2939514 dblp:conf/sigmod/KamatWN16 fatcat:6sl3563v75evtmpxbzf7pp6fua

Parameterized context windows in Random Indexing

Tobias Norlund, David Nilsson, Magnus Sahlgren
2016 Proceedings of the 1st Workshop on Representation Learning for NLP  
The parameterization introduces position specific weights in the context windows, and the approach is shown to improve the performance in both word similarity and sentiment classification tasks.  ...  This paper introduces a parameterization for word embeddings produced by the Random Indexing framework.  ...  and non-updated embeddings.  ... 
doi:10.18653/v1/w16-1619 dblp:conf/rep4nlp/NorlundNS16 fatcat:4vnenfqi7jcefomgxkv7raqeue

Dynamic Clustering in Object-Oriented Databases: An Advocacy for Simplicity [chapter]

Jerome Darmont, Christophe Fromantin, Stephane Régnier, Le Gruenwald, Michel Schneider
2001 Lecture Notes in Computer Science  
These three clustering algorithm have been implemented in the Texas persistent object store and compared in terms of clustering efficiency (i.e., overall performance increase) and overhead using the Object  ...  The third clustering technique, called Detection & Reclustering of Objects (DRO), is based on the same principles, but is much simpler to implement.  ...  Eventually, the object clustering algorithm initially builds a list of candidate pages containing objects related to the current object. To build this list, the database schema must be known.  ... 
doi:10.1007/3-540-44677-x_5 fatcat:mnlvg65fwjftjg3kh7nwgzsy3a

Big data security access control algorithm based on memory index acceleration in WSNs

Jianhua Peng, Hui Zhou, Qingjie Meng, Jingli Yang
2020 EURASIP Journal on Wireless Communications and Networking  
In our experiments, under the same test environment and security strategy, the performance has been greatly improved with the proposed algorithm.  ...  This paper first analyzes the data processing flow of the traditional access control strategy in big data systems, analyzes its time complexity, and explores how it affects system performance.  ...  Acknowledgements The authors acknowledged the anonymous reviewers and editors for their efforts in valuable comments and suggestions.  ... 
doi:10.1186/s13638-020-01725-1 fatcat:7hmotfud2vak5n57ay2vfymldq

Elix

Yongjian Hu, Oriana Riva, Suman Nath, Iulian Neamtiu
2019 Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services - MobiSys '19  
Elix can automatically and correctly discover links that are exposed by an app, and many others that are not explicitly exposed, thus increasing coverage of both link-enabled apps and link-enabled pages  ...  Elix can extract 80-90% of an app's links, and above 80% of the extracted links are stable.  ...  ACKNOWLEDGMENTS We thank our shepherd, Lin Zhong, and the anonymous reviewers for their feedback.  ... 
doi:10.1145/3307334.3326102 dblp:conf/mobisys/HuRNN19 fatcat:pbk3o2js4bh2rgronqnyz5egae
« Previous Showing results 1 — 15 out of 15,930 results