Cache-tuningComputational number theorySieving algorithmIn the present paper we describe and analyse a sieving algorithm for determining prime numbers. This external memory algorithm contains several parameters which are related to the sizes of the levels in the memory hierarchy. We examine how we ...
to aggregating node preferences during the consensus process to address Question 1. Next, we define the consensus output protocol as the basis for determining whether a node is malicious, and given that nodes may alter their protocol execution...
By comparing the obtained objective function values, the quality of the corresponding candidate solutions is effectively analyzed, determining the best candidate solution for a given problem. In minimization problems, the secretary bird with the lowest objective function value is the best candidate ...
We consider two different strategies for determining the priors for different hypotheses: variant-level priors and uniform priors. Variant-level prior probabilities The prior probability space for a single genetic variant can be fully partitioned into the prior probability that the genetic variant is no...
The packet size is calculated by determining and computing the mean value of several ECG parts, such as the high-amplitude QRS zone. The mean of the chosen sample size may contain fast fluctuations in amplitude induced by noise. To further minimize the amplitude, a division process is ...
\(\gamma\) means the minimum gain threshold for splitting leaf nodes to prevent overfitting, while \(\lambda\) regulates the strength of L2 regularization to mitigate model complexity and overfitting risk. After determining the structure of the tree, the objective function \({\tilde{L}}(\theta...
RSA is based on the process of factoring large integers. Its security comes from the difficulty of factoring large integers that are the product of two large prime numbers. Multiplying these two numbers is easy but determining the original prime numbers from the total -- orfactoring-- is consid...
There is a well understood need for an efficient and reliable method of determining a set of reference voltage levels which may accommodate variations in the threshold voltages of cells of an NVM array, and of established reference cells with the determined reference voltages....
This constraint prevents maintainers from accurately determining which data should be updated within the view, potentially resulting in data inaccuracies or omissions during maintenance. To effectively handle this issue and enhance the maintenance efficiency of access-control views, we use a ternary \(...
A Methodology for Determining an Effective Subset of Heuristics in Selection Hyper-Heuristics. Eur. J. Oper. Res. 2017, 260, 972–983. [Google Scholar] [CrossRef] Song, T.; Liu, S.; Tang, X.; Peng, X.; Chen, M. An Iterated Local Search Algorithm for the University Course ...