Search Results

You are looking at 1 - 10 of 16 items for :

  • Information Technology x
Clear All
Open access

Jinqiu Lv, Xiaoming You and Sheng Liu

Abstract

This paper proposes an improved ant colony system with adaptive strategies, called α

-AACS and considers its performance. First of all, we introduce α-nearness based on the minimum 1-tree for the disadvantage of the Ant Colony System (ACS), which better reflects the chances of a given link, being a member of an optimal tour. Next, we utilize the adaptive operator to balance the population diversity and the convergence speed and propose other optimizations for ACS. Finally, we present an account of the experiments and the statistic-based analysis, which clearly shows that α-AACS has a better global searching ability in finding the best solutions and better performance in solution variation.

Open access

Gábor György Gulyás, Gergely Acs and Claude Castelluccia

: Persistent tracking mechanisms in the wild. In ACM CCS, pages 674-689, 2014. [4] J. P. Achara, G. Acs, and C. Castelluccia. On the unicity of smartphone applications. In Proceedings of WPES, pages 27-36. ACM, 2015. [5] Article 29 Data Protection Working Party. Opinion 05/2014 on anonymization techniques, April 2014. [6] K. Boda, A. M. Földes, G. G. Gulyás, and S. Imre. User tracking on the web via cross-browser fingerprinting. In P. Laud, editor, Information Security Technology for Applications, volume 7161 of LNCS, pages 31

Open access

Ludmila Fedorchenko and Sergey Baranov

References 1. Aho, A., R. Sethi, J. Ullman. Compilers: Principles, Techniques and Tools. Addison- Wesley, 1986. 2. Fedorchenk o, L. An Algorithm of Parsing Languages Generated with R-Grammars. – In: Algorithms and Systems for Research Automation. Moscow, Nauka, 2008, 15-20 (in Russian). 3. Fedorchenko, L. Syntax Graph Transformations in the System SynGT and Regularization of Grammars. – In: International Multi- Conference on Advanced Computer Systems (ACS-CISIM'2004), 14-16 June 2004, Elk, Poland. http://acs.wi.ps.pl/info.php 4. Fedorchenko, L. On

Open access

Ch. Pradeep Reddy and P. Venkata Krishna

-299. 22. Venkata Krishna, P., S. Misra, M. S. Obaidat, V. Saritha. A New Scheme for Distributed Channel Allocation in Cellular Wireless Networks. - In: Proc. of 12th ACM/SCS Communications and Networking Simulation Symposium (CNS), San Deigo, USA, March 2009, 22-27. 23. Venkata Krishna, P., S. Misra, M. S. Obaidat, V. Saritha. An Efficient 802. 11 Medium Access Control Method and Its Simulation Analysis. - In: Proc. of 7th ACS/IEEE International Conference on Computer Systems and Applications, AICCSA 2009, Rabat, Morocco, 10-13 May 2009, 330-335 (accepted for

Open access

Truong Duc Phuong, Do Van Thanh and Nguyen Duc Dung

.-I., H.-E. Chueh, d Y.-C. Luo. An Integrated Sequential Patterns Mining with Fuzzy Time-Intervals – In: International Conference on Systems and Informatics (ICSAI’12), 2012. 5. Chen, R.-S. et al. Discovery of Fuzzy Sequential Patterns for Fuzzy Partitions in Quantitative Attributes. – In: ACS/IEEE International Conference on Computer Systems and Applications, 2001, pp. 144-150. 6. Chen, Y.-L., T. C.-K. Huang. Discovering Fuzzy Time-Interval Sequential Patterns in Sequence Databases. – IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics

Open access

El Moatez Billah Nagoudi, Ahmed Khorsi, Hadda Cherroun and Didier Schwab

. Cherroun. Efficient Inverted Index with n-Gram Sampling for String Matching in Arabic Documents. – In: 13th IEEE/ACS International Conference on Computer Systems and Applications, Agadir, Morocco, 2016, pp. 1-7. 17. Lebert, M. Project Gutenberg (1971-2008). Project Gutenberg, 2008. 18. Ogawa, Y., T. Morita, K. Kobayashi. A Fuzzy Document Retrieval System Using the Keyword Connection Matrix and a Learning Method. – Fuzzy Sets and Systems, Vol. 39 , 1991, No 2, pp. 163-179. 19. Zahran, M. A., A. Magooda, A. Y. Mahgoub, H. Raafat, M. Rashwan, A. Atyia

Open access

Applied Computer Systems

The Journal of Riga Technical University

Open access

Lixue Zou, Li Wang, Yingqi Wu, Caroline Ma, Sunny Yu and Xiwen Liu

@cas.org), Caroline Ma (cma@acs-i.org) and Sunny Yu (syu@acs-i.org) collected the data. Xiwen Liu (liuxw@mail.las.ac.cn) conceived and designed the analysis. References Chemical Abstracts Service. Retrieved from http://www.cas.org/ . Chemical Abstracts Service. Retrieved from http://www.cas.org/ Eck, N.J.V., & Waltman, L. (2009). How to normalize cooccurrence data? An analysis of some well-known similarity measures. Journal of the American society for information science and technology, 60(8), 1635–1651. 10.1002/asi.21075 Eck N.J.V. Waltman L. 2009 How to normalize

Open access

Viktors Skoks and Christian Steurer

, Inc. and ISO. Reference: OGC 03-105r1, pp. 601, 2004. [Online]. Available: http://www.ecartouche.ch/content_reg/cartouche/webservice/en/literatur/gml_3_1.pdf [Accessed: Sept. 23, 2010]. http://www.ecartouche.ch/content_reg/cartouche/webservice/en/literatur/gml_3_1.pdf "DAPS Ground Segment, ARF Reference Manual", Advanced Computer Systems, DAPS-MA-ACS-EURAC-0107, Issue: 1.0, pp. 99, 2009. "DAPS Ground Segment, SDF Reference Manual", Advanced Computer Systems, DAPS-MA-ACS-EURAC-0111, Issue: 1.0, pp. 94, 2009

Open access

Vitaly Zabiniako and Pavel Rusakov

-directed graph drawing method based on edge-edge repulsion” Journal of Visual Languages & Computing, vol. 23, pp. 29-42, Feb. 2012. http://dx.doi.org/10.1016/j.jvlc.2011.12.001 [7] C. Klukas, F. Schreiber, and H. Schwoebbermeyer, “Coordinated Perspectives and Enhanced Force-Directed Layout for the Analysis of Network Motifs” in Proceedings of Asia Pacific Symposium on Information Visualisation, APVIS2006, Tokyo, Japan, February 1-3, 2006, K. Misue, K. Sugiyama, J. Tanaka, Eds. ACS, 2006. pp. 39-48. [8] Y. Zhang, “Boundary Constraints in Force