Search Results

You are looking at 1 - 10 of 22 items for :

  • Computer Sciences x
Clear All
Open access

Gábor György Gulyás, Gergely Acs and Claude Castelluccia

: Persistent tracking mechanisms in the wild. In ACM CCS, pages 674-689, 2014. [4] J. P. Achara, G. Acs, and C. Castelluccia. On the unicity of smartphone applications. In Proceedings of WPES, pages 27-36. ACM, 2015. [5] Article 29 Data Protection Working Party. Opinion 05/2014 on anonymization techniques, April 2014. [6] K. Boda, A. M. Földes, G. G. Gulyás, and S. Imre. User tracking on the web via cross-browser fingerprinting. In P. Laud, editor, Information Security Technology for Applications, volume 7161 of LNCS, pages 31

Open access

Jinqiu Lv, Xiaoming You and Sheng Liu


This paper proposes an improved ant colony system with adaptive strategies, called α

-AACS and considers its performance. First of all, we introduce α-nearness based on the minimum 1-tree for the disadvantage of the Ant Colony System (ACS), which better reflects the chances of a given link, being a member of an optimal tour. Next, we utilize the adaptive operator to balance the population diversity and the convergence speed and propose other optimizations for ACS. Finally, we present an account of the experiments and the statistic-based analysis, which clearly shows that α-AACS has a better global searching ability in finding the best solutions and better performance in solution variation.

Open access

Ludmila Fedorchenko and Sergey Baranov

References 1. Aho, A., R. Sethi, J. Ullman. Compilers: Principles, Techniques and Tools. Addison- Wesley, 1986. 2. Fedorchenk o, L. An Algorithm of Parsing Languages Generated with R-Grammars. – In: Algorithms and Systems for Research Automation. Moscow, Nauka, 2008, 15-20 (in Russian). 3. Fedorchenko, L. Syntax Graph Transformations in the System SynGT and Regularization of Grammars. – In: International Multi- Conference on Advanced Computer Systems (ACS-CISIM'2004), 14-16 June 2004, Elk, Poland. 4. Fedorchenko, L. On

Open access

Ch. Pradeep Reddy and P. Venkata Krishna

-299. 22. Venkata Krishna, P., S. Misra, M. S. Obaidat, V. Saritha. A New Scheme for Distributed Channel Allocation in Cellular Wireless Networks. - In: Proc. of 12th ACM/SCS Communications and Networking Simulation Symposium (CNS), San Deigo, USA, March 2009, 22-27. 23. Venkata Krishna, P., S. Misra, M. S. Obaidat, V. Saritha. An Efficient 802. 11 Medium Access Control Method and Its Simulation Analysis. - In: Proc. of 7th ACS/IEEE International Conference on Computer Systems and Applications, AICCSA 2009, Rabat, Morocco, 10-13 May 2009, 330-335 (accepted for

Open access

Truong Duc Phuong, Do Van Thanh and Nguyen Duc Dung

.-I., H.-E. Chueh, d Y.-C. Luo. An Integrated Sequential Patterns Mining with Fuzzy Time-Intervals – In: International Conference on Systems and Informatics (ICSAI’12), 2012. 5. Chen, R.-S. et al. Discovery of Fuzzy Sequential Patterns for Fuzzy Partitions in Quantitative Attributes. – In: ACS/IEEE International Conference on Computer Systems and Applications, 2001, pp. 144-150. 6. Chen, Y.-L., T. C.-K. Huang. Discovering Fuzzy Time-Interval Sequential Patterns in Sequence Databases. – IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics

Open access

El Moatez Billah Nagoudi, Ahmed Khorsi, Hadda Cherroun and Didier Schwab

. Cherroun. Efficient Inverted Index with n-Gram Sampling for String Matching in Arabic Documents. – In: 13th IEEE/ACS International Conference on Computer Systems and Applications, Agadir, Morocco, 2016, pp. 1-7. 17. Lebert, M. Project Gutenberg (1971-2008). Project Gutenberg, 2008. 18. Ogawa, Y., T. Morita, K. Kobayashi. A Fuzzy Document Retrieval System Using the Keyword Connection Matrix and a Learning Method. – Fuzzy Sets and Systems, Vol. 39 , 1991, No 2, pp. 163-179. 19. Zahran, M. A., A. Magooda, A. Y. Mahgoub, H. Raafat, M. Rashwan, A. Atyia

Open access

Mohammad Aldabbas, Francesca Venteicher, Lenna Gerber and Marino Widmer

://]. [16] Kanellakos S., Fire Station Location Study - Phase 1. Ottawa Fire Services, 2013, [Available online:]. [17] Kolesar P., Walker W.E., An Algorithm for the Dynamic Relocation of Fire Companies, Operations Research, 22, 2, 1974, 249-274. [18] Lincoln Fire & Rescue, Station Optimization Study, 2012, [Available online:]. [19] Maystre L., Pictet J

Open access

Applied Computer Systems

The Journal of Riga Technical University

Open access

Lixue Zou, Li Wang, Yingqi Wu, Caroline Ma, Sunny Yu and Xiwen Liu, Caroline Ma ( and Sunny Yu ( collected the data. Xiwen Liu ( conceived and designed the analysis. References Chemical Abstracts Service. Retrieved from . Chemical Abstracts Service. Retrieved from Eck, N.J.V., & Waltman, L. (2009). How to normalize cooccurrence data? An analysis of some well-known similarity measures. Journal of the American society for information science and technology, 60(8), 1635–1651. 10.1002/asi.21075 Eck N.J.V. Waltman L. 2009 How to normalize

Open access

Miha Kovačič, Božidar Šarler and Uroš Župerl

.1080/10426914.2010.525576. [4] Kovačič M. Modeling of Total Decarburization of Spring Steel with Genetic Programming. Mater Manuf Process 2014;30:434-43. doi: 10.1080/10426914.2014.961477. [5] Kovačič M., Rožej U., Brezočnik M., Genetic Algorithm Rolling Mill Layout Optimization. Mater Manuf Process 2013;28:783-7. doi: 10.1080/10426914.2012.718475. [6] Zuperl U., Cus F., System for off-line feedrate optimization and neural force control in end milling. Int J Adapt Control Signal Process 2012;26:105-23. doi: 10.1002/acs.1277. [7] Zuperl U