Determining the optimal fidelity for the transmission of quantum informa...
In distributed transaction processing, atomic commit protocol (ACP) is u...
We study best arm identification in a federated multi-armed bandit setti...
Recent neural methods for vehicle routing problems always train and test...
In this work, we study two types of constraints on two-dimensional binar...
Permutation codes were extensively studied in order to correct different...
Numerous advancements in deep learning can be attributed to the access t...
We present an efficient Neural Neighborhood Search (N2S) approach for pi...
Interactive graph search (IGS) uses human intelligence to locate the tar...
Resistive memories, such as phase change memories and
resistive random a...
Machine learning (ML) is an important part of modern data science
applic...
The de Bruijn graph, its sequences, and their various generalizations, h...
A robust positioning pattern is a large array that allows a mobile devic...
The linear complexity of a sequence s is one of the measures of its
pred...
An indel refers to a single insertion or deletion, while an edit refers ...
Storage architectures ranging from minimum bandwidth regenerating encode...
The study of Armstrong codes is motivated by the problem of understandin...
Codes that can correct up to t symmetric errors and detect all
unidirect...
To equip DNA-based data storage with random-access capabilities, Yazdi e...
A class of low-power cooling (LPC) codes, to control simultaneously both...
Tandem duplication is the process of inserting a copy of a segment of DN...