• Study Resource
  • Explore
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
Document
Document

... Lectures on Recursive Algorithms ...
Securing BGP - blabs.apnic.net
Securing BGP - blabs.apnic.net

... Is this a case of reducing the security credential generation and validation workload by reducing the security outcomes through reduced trust and/or reduced amount of validated information  Or is this a case of increasing the level of assurance and the amount of routing information secured by these ...
lecture slides - CSE, IIT Bombay
lecture slides - CSE, IIT Bombay

...  What properties do real-life graphs have?  How important is a node? What is importance?  Who is the best customer to target in a social network?  Who spread a raging rumor?  How similar are two nodes?  How do nodes influence each other?  Can I predict some property of a node based on its nei ...
GMPLS-based provisioning of Ethernet connections over WSON with Quality of Service Ph.D. Thesis
GMPLS-based provisioning of Ethernet connections over WSON with Quality of Service Ph.D. Thesis

Design of Cognitive Radio Systems Under Temperature
Design of Cognitive Radio Systems Under Temperature

Querying Network Graphs with Recursive Queries
Querying Network Graphs with Recursive Queries

Factoring via Strong Lattice Reduction Algorithms 1 Introduction
Factoring via Strong Lattice Reduction Algorithms 1 Introduction

mit-csail-tr-2015
mit-csail-tr-2015

A brief history - School of Information Technologies
A brief history - School of Information Technologies

... Businesses (and sciences) believe that their data sets contains useful information, and they want to get some business (or scientific)) value out of these data sets. ...
Drawing Clustered Graphs - School of Information Technologies
Drawing Clustered Graphs - School of Information Technologies

... 1970s: Read’s algorithm  Linear time straight-line drawing 1984: Tamassia algorithm  Minimum number of bends 1987: Tamassia-Tollis algorithms  Visibility drawing, upward planarity 1989: de Frassieux - Pach - Pollack Theorem  Quadratic area straight-line drawing ...
Graph Partitioning with AMPL - Antonio Mucherino Home Page
Graph Partitioning with AMPL - Antonio Mucherino Home Page

Aalborg Universitet Trigonometric quasi-greedy bases for Lp(T;w) Nielsen, Morten
Aalborg Universitet Trigonometric quasi-greedy bases for Lp(T;w) Nielsen, Morten

... where h·, ·i is the standard inner product on L2 (T). Thus, the greedy algorithm for T in Lp (T; w) coincides with the usual greedy algorithm for the trigonometric system. Our main result in Section 3 gives a complete characterization of the non-negative weights w on T := [−π, π) such that T forms a ...
W. Dean. Algorithms and the mathematical foundations of computer
W. Dean. Algorithms and the mathematical foundations of computer

final script
final script

... includes parent, children, depth, path cost g(x) States do not have parents, children, depth, or path cost! ...
Fast Matrix Rank Algorithms and Applications - USC
Fast Matrix Rank Algorithms and Applications - USC

... connectivity [10, 35, 12], matroid optimization problems [22, 11] are based on fast algorithms for computing matrix rank and finding linearly independent columns. The traditional approach to compute rank(A) is by Gaussian elimination. For an m × n matrix with m ≤ n, it is known that this approach ca ...
Routing - La Salle University
Routing - La Salle University

... of the links connecting the source (root) to a node. ...
Texts in Computational Complexity - The Faculty of Mathematics and
Texts in Computational Complexity - The Faculty of Mathematics and

Evolutionary Design of FreeCell Solvers
Evolutionary Design of FreeCell Solvers

Routing - La Salle University
Routing - La Salle University

... the links connecting the source (root) to a node. • If a path takes us to a node which already has been reached, then we compare the costs of the two paths and keep the lower. CSIT 220 (Blum) ...
On the Use of Non-Stationary Strategies for Solving Two
On the Use of Non-Stationary Strategies for Solving Two

Longest Common Substring with Approximately k Mismatches
Longest Common Substring with Approximately k Mismatches

... deterministic and randomised solutions exist [9, 10, 14, 22, 20], for example, one can use a Lowest Common Ancestor (LCA) data structure, which can be constructed in linear time and space and maintains longest common prefix queries in O(1) time [14, 20]. Our solution to the longest common substring ...
A Market-Based Study of Optimal ATM`S Deployment Strategy
A Market-Based Study of Optimal ATM`S Deployment Strategy

Editorial Advances in Computational Imaging: Theory, Algorithms
Editorial Advances in Computational Imaging: Theory, Algorithms

Chapter 19 Java Data Structures
Chapter 19 Java Data Structures

... Array is a fixed-size data structure. Once an array is created, its size cannot be changed. Nevertheless, you can still use array to implement dynamic data structures. The trick is to create a new larger array to replace the current array if the current array cannot hold new elements in the list. In ...
ip-shiv2004-routing-I
ip-shiv2004-routing-I

... After every iteration each node i exchanges its distance vectors D(i,*) with its immediate neighbors. For any neighbor k, if c(i,k) + D(k,j) < D(i,j), then:  D(i,j) = c(i,k) + D(k,j)  next-hop(j) = k After each iteration, the consistency criterion is met  After m iterations, each node knows the s ...
< 1 2 3 4 5 6 ... 27 >

Dijkstra's algorithm

  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report