We follow nearest neighbor approach by: Zaliapin, I., and Ben-Zion, Y., 2013, Earthquake clusters in southern California I: Identification and stability: Journal of ...
block-insertion-theorem is a reproducible reference implementation of a combinatorial result about block insertion and counting linear extensions of posets. The repository provides a formal JSON ...
Cryptography secures communication in banking, messaging, and blockchain. Good algorithms (AES, RSA, ECC, SHA-2/3, ChaCha20) are secure, efficient, and widely trusted. Bad algorithms (DES, MD5, SHA-1, ...
ABSTRACT: The objective of this work is to determine the true owner of a land—public or private—in the region of Kumasi (Ghana). For this purpose, we applied different machine learning methods to the ...
Abstract: The Nearest-Better Network (NBN) is a powerful method to visualize sampled data for continuous optimization problems while preserving multiple landscape features. However, the calculation of ...
A hacker planted data wiping code in a version of Amazon's generative AI-powered assistant, the Q Developer Extension for Visual Studio Code. Amazon Q is a free extension that uses generative AI to ...
Abstract: For mobile robots with multiple destinations that must be visited only once, the Traveling Salesman Problem (TSP) provides an optimal route. The optimality may not be achieved for crawler ...
There's a familiar TV discourse taking shape online right now, the kind that I suspect will look awfully familiar to you if you remember the way Game of Thrones crashed and burned in its eighth and ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results