Search results for "Computation"

showing 10 items of 7362 documents

Game of Thieves and WERW-Kpath: Two Novel Measures of Node and Edge Centrality for Mafia Networks

2021

Real-world complex systems can be modeled as homogeneous or heterogeneous graphs composed by nodes connected by edges. The importance of nodes and edges is formally described by a set of measures called centralities which are typically studied for graphs of small size. The proliferation of digital collection of data has led to huge graphs with billions of nodes and edges. For this reason, we focus on two new algorithms, Game of Thieves and WERW-Kpath which are computationally-light alternatives to the canonical centrality measures such as degree, node and edge betweenness, closeness and clustering. We explore the correlation among these measures using the Spearman’s correlation coefficient …

Theoretical computer scienceSettore INF/01 - InformaticaDegree (graph theory)Computer scienceClosenessComplex networksMafia networksComplex networkCorrelationComputational complexityBetweenness centralityNode (computer science)CentralityRank (graph theory)Cluster analysisCentrality
researchProduct

GPU-accelerated exhaustive search for third-order epistatic interactions in case–control studies

2015

This is a post-peer-review, pre-copyedit version of an article published in Journal of Computational Science. The final authenticated version is available online at: https://doi.org/10.1016/j.jocs.2015.04.001 [Abstract] Interest in discovering combinations of genetic markers from case–control studies, such as Genome Wide Association Studies (GWAS), that are strongly associated to diseases has increased in recent years. Detecting epistasis, i.e. interactions among k markers (k ≥ 2), is an important but time consuming operation since statistical computations have to be performed for each k-tuple of measured markers. Efficient exhaustive methods have been proposed for k = 2, but exhaustive thi…

Theoretical computer scienceSource codeGeneral Computer ScienceComputer scienceComputationmedia_common.quotation_subjectGPUBrute-force searchCUDAMutual informationcomputer.software_genreTheoretical Computer ScienceMutual informationCUDAModeling and SimulationEpistasisGWASNode (circuits)Data miningTupleHeuristicscomputermedia_commonJournal of Computational Science
researchProduct

Challenges of Program Synthesis with Grammatical Evolution

2020

Program synthesis is an emerging research topic in the field of EC with the potential to improve real-world software development. Grammar-guided approaches like GE are suitable for program synthesis as they can express common programming languages with their required properties. This work uses common software metrics (lines of code, McCabe metric, size and depth of the abstract syntax tree) for an analysis of GE’s search behavior and the resulting problem structure. We find that GE is not able to solve program synthesis problems, where correct solutions have higher values of the McCabe metric (which means they require conditions or loops). Since small mutations of high-quality solutions str…

Theoretical computer scienceSource lines of codebusiness.industryComputer scienceSoftware developmentGenetic programming0102 computer and information sciences02 engineering and technology01 natural sciencesSoftware metric010201 computation theory & mathematicsGrammatical evolutionMetric (mathematics)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinessAbstract syntax treeProgram synthesis
researchProduct

Artificial Intelligence + Distributed Systems = Agents

2009

The connection with Wirth’s book goes beyond the title, albeit confining the area to modern Artificial Intelligence (AI). Whereas thirty years ago, to devise effective programs, it became necessary to enhance the classical algorithmic framework with approaches applied to limited and focused subdomains, in the context of broad-band technology and semantic web, applications - running in open, heterogeneous, dynamic and uncertain environments-current paradigms are not enough, because of the shift from programs to processes. Beside the structure as position paper, to give more weight to some basic assertions, results of recent research are abridged and commented upon in line with new paradigms.…

Theoretical computer scienceSpeedupComputer Networks and CommunicationsComputer sciencebusiness.industryDesign elements and principlesBounded rationalityComputer Science ApplicationsSoftwareComputational Theory and MathematicsPosition paperArtificial intelligencebusinessSemantic WebMerge (version control)International Journal of Computers Communications & Control
researchProduct

Mesh connectivity compression using convection reconstruction

2007

International audience; During a highly productive period running from 1995 to about 2002, the research in lossless compression of 3D meshes mainly consisted in a hard battle for the best bitrates. But for a few years, compression rates seem stabilized around 1.5 bit per vertex for the connectivity coding of usual meshes, and more and more work is dedicated to remeshing, lossy compression, or gigantic mesh compression, where memory and CPU optimizations are the new priority. However, the size of 3D models keeps growing, and many application fields keep requiring lossless compression. In this paper, we present a new contribution for single-rate lossless connectivity compression, which first …

Theoretical computer scienceTexture compressionLossless[ MATH.MATH-IT ] Mathematics [math]/Information Theory [math.IT]02 engineering and technologyLossy compression[INFO.INFO-CG]Computer Science [cs]/Computational Geometry [cs.CG][MATH.MATH-IT] Mathematics [math]/Information Theory [math.IT][ INFO.INFO-IT ] Computer Science [cs]/Information Theory [cs.IT]I.3.5 [Computing Methodologies]: Computer Graphics--Computational Geometry and Object Modeling0202 electrical engineering electronic engineering information engineeringPolygon meshComputingMethodologies_COMPUTERGRAPHICSMathematicsMeshConnected componentLossless compressionConnectivityDelaunay triangulationCompression[MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]020207 software engineering[INFO.INFO-CG] Computer Science [cs]/Computational Geometry [cs.CG][INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT][ INFO.INFO-CG ] Computer Science [cs]/Computational Geometry [cs.CG]020201 artificial intelligence & image processing[INFO.INFO-IT] Computer Science [cs]/Information Theory [cs.IT]ReconstructionAlgorithmImage compressionData compressionProceedings of the 2007 ACM symposium on Solid and physical modeling
researchProduct

Robustness and Randomness

2008

The study of robustness problems for computational geometry algorithms is a topic that has been subject to intensive research efforts from both computer science and mathematics communities. Robustness problems are caused by the lack of precision in computations involving floating-point instead of real numbers. This paper reviews methods dealing with robustness and inaccuracy problems. It discusses approaches based on exact arithmetic, interval arithmetic and probabilistic methods. The paper investigates the possibility to use randomness at certain levels of reasoning to make geometric constructions more robust.

Theoretical computer sciencebusiness.industryComputation020207 software engineering0102 computer and information sciences02 engineering and technologyMachine learningcomputer.software_genre01 natural sciencesInterval arithmeticProbabilistic method010201 computation theory & mathematicsRobustness (computer science)0202 electrical engineering electronic engineering information engineeringArtificial intelligencebusinesscomputerRandomnessMathematicsReal number
researchProduct

More Power through Symbolic Computation: Extending Stata by using the Maxima Computer algebra system

2015

Maxima is a free and open-source computer algebra system that can perform symbolic computations such as solving equations, determining derivatives of functions, obtaining Taylor series, and manipulating algebraic expressions. In this article, I present the Maxima Bridge System, which is a collection of software programs that allows Stata to interface with Maxima so that Maxima can be used for symbolic computation to transfer data from Stata to Maxima and to retrieve results from Maxima. The cooperation between Stata and Maxima provides an environment for statistical analysis in which symbolic computation can be easily used together with all the facilities supplied by Stata. In this environ…

Theoretical computer sciencebusiness.industryComputationInterface (computing)Symbolic computationsymbols.namesakeMathematics (miscellaneous)SoftwareComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATIONTaylor seriessymbolsAlgebraic expressionbusinessMaximaAlgorithmMathematicsEquation solvingThe Stata Journal: Promoting communications on statistics and Stata
researchProduct

Representations for evolutionary algorithms

2015

Successful and efficient use of evolutionary algorithms (EA) depends on the choice of the genotype, the problem representation (mapping from genotype to phenotype) and on the choice of search operators that are applied to the genotypes. These choices cannot be made independently of each other. The question whether a certain representation leads to better performing EAs than an alternative representation can only be answered when the operators applied are taken into consideration. The reverse is also true: deciding between alternative operators is only meaningful for a given representation. In EA practice one can distinguish two complementary approaches. The first approach uses indirect repr…

Theoretical computer sciencebusiness.industryComputer scienceEvolutionary algorithmRepresentation (systemics)Genetic programming0102 computer and information sciences02 engineering and technologyComputingMethodologies_ARTIFICIALINTELLIGENCEPhenotype01 natural sciencesOperator (computer programming)Grammatical evolution010201 computation theory & mathematicsGenetic algorithmGenotype0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingGenetic representationArtificial intelligencebusinessProceedings of the Genetic and Evolutionary Computation Conference Companion
researchProduct

A basic analysis toolkit for biological sequences

2007

This paper presents a software library, nicknamed BATS, for some basic sequence analysis tasks. Namely, local alignments, via approximate string matching, and global alignments, via longest common subsequence and alignments with affine and concave gap cost functions. Moreover, it also supports filtering operations to select strings from a set and establish their statistical significance, via z-score computation. None of the algorithms is new, but although they are generally regarded as fundamental for sequence analysis, they have not been implemented in a single and consistent software package, as we do here. Therefore, our main contribution is to fill this gap between algorithmic theory an…

Theoretical computer sciencelcsh:QH426-470Computer sciencebusiness.industrysoftwareComputationApplied MathematicsString searching algorithmApproximate string matchingSoftware ArticleSet (abstract data type)Longest common subsequence problemlcsh:GeneticsSoftwareComputational Theory and Mathematicslcsh:Biology (General)Structural BiologyAffine transformationPerlbusinesscomputerMolecular Biologylcsh:QH301-705.5computer.programming_language
researchProduct

Relativistic Electronic Structure Theory. Part 1. Fundamentals. By Peter Schwerdtfeger.

2004

Theoretical physicsComputational chemistryChemistryGeneral ChemistryElectronic structureCatalysisAngewandte Chemie International Edition
researchProduct