In this paper we deal with codes identifying sets of vertices in random networks; that is, (1, ≤ ℓ)-identifying codes. These codes enable us to detect sets of faulty processor...
Alan M. Frieze, Ryan Martin, Julien Moncel, Mikl&o...
Edge networks connected to the Internet need effective monitoring techniques to drive routing decisions and detect violations of Service Level Agreements (SLAs). However, existing...
Sharon Goldberg, David Xiao, Eran Tromer, Boaz Bar...
Multi-valued and universal binary neurons (MVN and UBN) are the neural processing elements with the complex-valued weights and high functionality. It is possible to implement an a...
The identification of clusters, well-connected components in a graph, is useful in many applications from biological function prediction to social community detection. However, ...
Abstract. In this paper, we incorporated the global convex segmentation method and the split Bregman technique into the region-scalable fitting energy model. The new proposed metho...
Yunyun Yang, Chunming Li, Chiu-Yen Kao, Stanley Os...