Magnus [57%](Software) [Computer algebra systems] ... answers even when general algorithms may ... simultaneous algorithms working on the same ... which may involve several algorithms ...
Geometric set cover problem [54%](Computing) [Geometry] ... algorithms The greedy algorithm for the ... algorithms 2 Near-linear-time algorithms ... NP-hard.[2] Many approximation algorithms have ...
Crypto-agility [54%](Computing) [Cryptographic algorithms] ... primitives and algorithms have been ... cryptographic algorithms or parameters can be ... cryptographic primitives and algorithms ...
Model-free [53%](Computing) [Reinforcement learning] ... reinforcement learning algorithms ... algorithms can learn from incomplete episodes ... model-free algorithms include Monte Carlo RL, ...
Heuristic routing [53%](Computing) [Routing] ... Distance vector algorithms 1.2 Link state algorithms 2 See also 3 References IP ... algorithms to determine a better, although ...
Stability [52%](Computing) [Learning] [Machine learning] ... example is language learning algorithms ... results could not be applied to algorithms ... algorithms with function classes that do ...
Channelizer [51%](Computing) [Digital signal processing] ... also used for algorithms that can select ... In Digital signal processing, a channelizer is a term used for algorithms which ...
Zeta-TCP [51%](Computing) [Internet protocols] ... algorithm. The New Reno-based algorithms are loss-based. Loss-based algorithms ... algorithms aiming at improving the ...
Andrew V. Goldberg [44%](Biography) [American computer scientists] ... in the design and analysis of algorithms ... with a thesis on the Efficient graph algorithms ... of algorithms. He also worked on mechanism design, computer ...
William B. Gragg [44%](Biography) [Numerical analysts] ... algorithms for ordinary initial value problems, WB ... to a large number of algorithms in numerical ... algorithms for solving eigenvalue problems, as well ...
Median trick [44%](Computing) [Statistical randomness] ... .[4] For the algorithms that are sublinear in space ... in time algorithms the same algorithm can be run ... ] by Jerrum et al.[3] for approximate counting algorithms ...
DataAnalysis/9 Peak Finders [43%](DMelt) ... also find peak finder based on the algorithms ... algorithms for identifications of peaks in data.Let us consider a peak identification algorithms in arrays ...
Introduction to data science [43%](DScience) ... various algorithms and their implementations. More ... . This courses introduces the main ideas and algorithms used ... , algorithms and computer programs to extract ...
Algorithmic paradigm [43%](Computing) [Algorithms] ... Sweep line algorithms Rotating calipers Randomized ... of algorithms. An algorithmic paradigm ... underlying a variety of algorithms An algorithmic paradigm ...
Sequential algorithm [43%](Computing) [Algorithms] ... – many distributed algorithms are both concurrent ... or parallel algorithm; most standard computer algorithms are sequential algorithms, and not specifically ...
Rapidly exploring dense trees [43%](Computing) [Search algorithms] ... , S.M. (2006). Planning Algorithms, Section 14.4.3 ... Algorithms, Section 5.5: Rapidly Exploring Dense Trees ... trees is a family of planning algorithms ...
Kazuo Iwama [43%](Biography) [Theoretical computer scientists] ... for Algorithms and Computation in 2007. He was the founding editor-in-chief of the journal Algorithms ... problem , and algorithms on graphs. Education ...
Mathieu Blanchette [43%](Biography) [Bioinformaticians] ... developed algorithms for reconstructing ancestral ... thesis, titled Algorithms for phylogenetic ... focuses on developing new algorithms ...
Monte Carlo algorithm [42%](Computing) [Randomized algorithms] ... , this is not the case for Monte Carlo algorithms. For decision ... algorithms are a dual of Monte Carlo algorithms and never ... examples of such algorithms are the Karger–Stein ...
In-place algorithm [42%](Computing) [Algorithms] ... . These algorithms require only a few pointers, so their space ... algorithms rearrange arrays into sorted order in-place ... . Since in-place algorithms usually overwrite ...
The Algorithm Auction [42%](Computing) [Algorithms] ... algorithms,” including a set of JavaScript tools ... physical representations of famous code or algorithms ... auction of computer algorithms.[1] Created by Ruse ...
Pi algorithms [42%](Category) [Computer arithmetic algorithms] ... to arbitrary precision. Pages in category "Pi algorithms ... Computing portal Here is a list of articles in the category Pi algorithms of the Computing portal ...
EKF SLAM [42%](Engineering) [Robot control] ... ). Typically, EKF SLAM algorithms are feature based ... In robotics, EKF SLAM is a class of algorithms which utilizes the extended Kalman filter (EKF ...
Stefan Szeider [42%](Biography) [Theoretical computer scientists] ... ://www.vcla.at/ Vienna Center for Logic and Algorithms (VCLA ... of Technology (TU Wien), the head of the Algorithms ... who works on the areas of algorithms ...
Bin packing [42%](Category) [Packing problems] ... -Karp bin packing algorithms Karmarkar–Karp bin packing algorithms M Multifit algorithm N Next-fit ...
Genetic algorithms [41%](Computing) [Artificial intelligence] ... E (1989), Genetic Algorithms in Search ... Algorithms and Grouping Problems, John Wiley & Sons Ltd ... Genetic algorithms or GAs view learning ...
Adversary model [40%](Computing) [Analysis of algorithms] ... of Randomization in On-line Algorithms". Algorithmica 11: 2 ... . For randomized online algorithms competitiveness can ... models. For deterministic algorithms, the adversary ...
Himmelblau's function [40%](Computing) ... In mathematical optimization, Himmelblau's function is a multi-modal function, used to test the performance of optimization algorithms. The function ...
Polynomial delay [40%](Computing) [Analysis of algorithms] ... even for algorithms that produce an infinite sequence ... , unlike some algorithms that take polynomial time per ... In the analysis of algorithms, an enumeration ...
Science of Science Tool [40%](Software) [Graph drawing software] ... , algorithms, tools, and computing resources developed ... specific datasets.* Share datasets and algorithms ... effective algorithms available.* Use different ...
Mcrypt [40%](Software) [Cryptographic software] ... algorithms, mostly block ciphers and stream ciphers, some ... encryption algorithms.
mcrypt ... functionality but uses several modern algorithms such as AES ...
Carla Savage [40%](Biography) [American computer scientists] ... Fellow "for outstanding research in algorithms ... algorithms.[3] Much of her more recent research has concerned Gray codes and algorithms for efficient ...
NSA product types [39%](Computing) [Cryptographic algorithms] ... approved algorithms. Used to protect systems requiring ... and containing NSA approved algorithms. Used ... cryptographic products or algorithms ...
Range segmentation [39%](Computing) [Image segmentation] ... algorithms and region-growing algorithms. Algorithms of the first group are based on assuming ... algorithms can be further categorized into two major ...