Search results for "Theoretical computer science"

showing 10 items of 1151 documents

Abstracts from the CECAM workshop on computer simulations of cellular automata

1989

010101 applied mathematicsTheoretical computer scienceComputer science0103 physical sciencesStatistical and Nonlinear Physics0101 mathematics010306 general physics01 natural sciencesMathematical PhysicsCellular automatonJournal of Statistical Physics
researchProduct

Efficient generation of restricted growth words

2013

A length n restricted growth word is a word w=w"1w"2...w"n over the set of integers where w"1=0 and each w"i, i>1, lies between 0 and the value of a word statistics of the prefix w"1w"2...w"i"-"1 of w, plus one. Restricted growth words simultaneously generalize combinatorial objects as restricted growth functions, staircase words and ascent or binary sequences. Here we give a generic generating algorithm for restricted growth words. It produces a Gray code and runs in constant average time provided that the corresponding statistics has some local properties.

010102 general mathematicsBinary numberValue (computer science)0102 computer and information sciences[ MATH.MATH-CO ] Mathematics [math]/Combinatorics [math.CO]01 natural sciencesComputer Science ApplicationsTheoretical Computer SciencePrefixCombinatoricsGray code010201 computation theory & mathematics[MATH.MATH-CO]Mathematics [math]/Combinatorics [math.CO]Signal ProcessingPartial word0101 mathematicsConstant (mathematics)ComputingMilieux_MISCELLANEOUSWord (group theory)Information SystemsMathematicsInformation Processing Letters
researchProduct

Restricted compositions and permutations: from old to new Gray codes

2011

Any Gray code for a set of combinatorial objects defines a total order relation on this set: x is less than y if and only if y occurs after x in the Gray code list. Let @? denote the order relation induced by the classical Gray code for the product set (the natural extension of the Binary Reflected Gray Code to k-ary tuples). The restriction of @? to the set of compositions and bounded compositions gives known Gray codes for those sets. Here we show that @? restricted to the set of bounded compositions of an interval yields still a Gray code. An n-composition of an interval is an n-tuple of integers whose sum lies between two integers; and the set of bounded n-compositions of an interval si…

0102 computer and information sciences02 engineering and technologyInterval (mathematics)[ MATH.MATH-CO ] Mathematics [math]/Combinatorics [math.CO]01 natural sciencesTheoretical Computer ScienceCombinatoricsGray codePermutationsymbols.namesakeInteger020204 information systems[MATH.MATH-CO]Mathematics [math]/Combinatorics [math.CO]0202 electrical engineering electronic engineering information engineeringComputingMilieux_MISCELLANEOUSMathematicsDiscrete mathematicsExtension (predicate logic)Composition (combinatorics)Cartesian productComputer Science Applications010201 computation theory & mathematicsComputer Science::Computer Vision and Pattern RecognitionBounded functionSignal ProcessingsymbolsInformation Systems
researchProduct

Statistics-preserving bijections between classical and cyclic permutations

2012

Recently, Elizalde (2011) [2] has presented a bijection between the set C"n"+"1 of cyclic permutations on {1,2,...,n+1} and the set of permutations on {1,2,...,n} that preserves the descent set of the first n entries and the set of weak excedances. In this paper, we construct a bijection from C"n"+"1 to S"n that preserves the weak excedance set and that transfers quasi-fixed points into fixed points and left-to-right maxima into themselves. This induces a bijection from the set D"n of derangements to the set C"n"+"1^q of cycles without quasi-fixed points that preserves the weak excedance set. Moreover, we exhibit a kind of discrete continuity between C"n"+"1 and S"n that preserves at each s…

0102 computer and information sciencesFixed point[ MATH.MATH-CO ] Mathematics [math]/Combinatorics [math.CO]01 natural sciencesCombinatorial problemsTheoretical Computer ScienceCyclic permutationSet (abstract data type)CombinatoricsBijections[MATH.MATH-CO]Mathematics [math]/Combinatorics [math.CO]0101 mathematicsComputingMilieux_MISCELLANEOUSMathematicsDescent (mathematics)Discrete mathematicsStatistics on permutationsMathematics::Combinatorics010102 general mathematicsDescentComputer Science ApplicationsDerangement010201 computation theory & mathematicsExcedenceSignal ProcessingBijectionBijection injection and surjectionMaximaInformation Systems
researchProduct

Coupling agent-based with equation-based models to study spatially explicit megapopulation dynamics

2018

International audience; The incorporation of the spatial heterogeneity of real landscapes into population dynamics remains extremely difficult. We propose combining equation-based modelling (EBM) and agent-based modelling (ABM) to overcome the difficulties classically encountered. ABM facilitates the description of entities that act according to specific rules evolving on various scales. However, a large number of entities may lead to computational difficulties (e.g., for populations of small mammals, such as voles, that can exceed millions of individuals). Here, EBM handles age-structured population growth, and ABM represents the spreading of voles on large scales. Simulations applied to t…

0106 biological sciencesHybrid modellingTheoretical computer scienceComputer sciencePopulation[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]010603 evolutionary biology01 natural sciences[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Travelling waveArvicolaPopulation growtheducation[SDV.EE]Life Sciences [q-bio]/Ecology environmenteducation.field_of_studySpatial contextual awareness010604 marine biology & hydrobiologyEcological ModelingDispersal15. Life on land[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationSpatial heterogeneityCoupling (computer programming)[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Biological dispersalMontane ecology[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC][SDE.BE]Environmental Sciences/Biodiversity and EcologyHybrid modelHybrid modelEcological Modelling
researchProduct

Null models for animal social network analysis and data collected via focal sampling: Pre‐network or node network permutation?

2020

In social networks analysis, two different approaches have predominated in creating null models for hypothesis testing, namely pre‐network and node network permutation approaches. Although the pre‐network permutation approach appears more advantageous, its use has mainly been restricted to data on associations and sampling methods such as ‘group follows’. The pre‐network permutation approach has recently been adapted to data on interactions and the focal sampling method, but its performance in different scenarios has not been thoroughly explored. Here, we assessed the performance of the pre‐network and node network permutation approach in several simulated scenarios based on proneness to fa…

0106 biological sciencesTheoretical computer scienceComputer scienceEcological Modeling05 social sciencesNull (mathematics)Social network analysis (criminology)Sampling (statistics)Group living010603 evolutionary biology01 natural sciences[SHS]Humanities and Social SciencesPermutationSciences du Vivant [q-bio]/Autre [q-bio.OT]0501 psychology and cognitive sciences050102 behavioral science & comparative psychologyEcology Evolution Behavior and SystematicsComputingMilieux_MISCELLANEOUSVDP::Samfunnsvitenskap: 200::Urbanisme og fysisk planlegging: 230
researchProduct

Bit-parallel approximate pattern matching: Kepler GPU versus Xeon Phi

2016

Advanced SIMD features on GPUs and Xeon Phis promote efficient long pattern search.A tiled approach to accelerating the Wu-Manber algorithm on GPUs has been proposed.Both the GPU and Xeon Phi yield two orders-of-magnitude speedup over one CPU core.The GPU-based version with tiling runs up to 2.9 × faster than the Xeon Phi version. Approximate pattern matching (APM) targets to find the occurrences of a pattern inside a subject text allowing a limited number of errors. It has been widely used in many application areas such as bioinformatics and information retrieval. Bit-parallel APM takes advantage of the intrinsic parallelism of bitwise operations inside a machine word. This approach typica…

020203 distributed computingSpeedupCoprocessorXeonComputer Networks and CommunicationsComputer science02 engineering and technologyParallel computingSupercomputerComputer Graphics and Computer-Aided DesignTheoretical Computer ScienceCUDAArtificial IntelligenceHardware and Architecture0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingSIMDBitwise operationSoftwareWord (computer architecture)Xeon PhiParallel Computing
researchProduct

Usability and acceptability assessment of an empathic virtual agent to prevent major depression

2016

In Human-Computer Interaction, the adaptation of the content and the way of how this content is communicated to the users in interactive sessions is a critical issue to promote the acceptability and usability of any computational system. We present a user-adapted interactive platform to identify and provide an early intervention for symptoms of depression and suicide. In particular, we describe the work performed to assess users' system acceptability and usability. An empathic Virtual Agent is the main interface with the user, and it has been designed to generate the appropriate dialogues and emotions during the interactions according to the detected user's specific needs. This personalizat…

020205 medical informaticsPluralistic walkthroughComputer science02 engineering and technologyTheoretical Computer ScienceUsability lab03 medical and health sciences0302 clinical medicineArtificial IntelligenceHuman–computer interactionHeuristic evaluationacceptabilityemotional virtual agent0202 electrical engineering electronic engineering information engineeringAdaptation (computer science)Web usabilityInteractive systems engineeringbusiness.industryUser modelingUsabilityHuman-computer interaction030227 psychiatryuser-adapted sessionsusabilityComputational Theory and MathematicsControl and Systems EngineeringFISICA APLICADAbusiness
researchProduct

Robust Network Agreement on Logical Information

2011

Abstract Logical consensus is an approach to distributed decision making which is based on the availability of a network of agents with incomplete system knowledge. The method requires the construction of a Boolean map which defines a dynamic system allowing the entire network to consent on a unique, global decision. Previous work by the authors proved the method to be viable for applications such as intrusion detection within a structured environment, when the agent's communication topology is known in advance. The current work aims at providing a fully distributed protocol, requiring no a priori knowledge of each agent's communication neighbors. The protocol allows the construction of a r…

0209 industrial biotechnology020901 industrial engineering & automationTheoretical computer scienceSettore ING-INF/04 - AutomaticaComputer scienceDistributed computingIntrusion detection security robust logical consensus networked and distributed systems.0202 electrical engineering electronic engineering information engineering020207 software engineeringTopology (electrical circuits)02 engineering and technologyIntrusion detection systemProtocol (object-oriented programming)
researchProduct

Large multiple neighborhood search for the soft-clustered vehicle-routing problem

2021

Abstract The soft-clustered vehicle-routing problem (SoftCluVRP) is a variant of the classical capacitated vehicle-routing problem. Customers are partitioned into clusters and all customers of the same cluster must be served by the same vehicle. In this paper, we present a large multiple neighborhood search for the SoftCluVRP. We design and analyze multiple cluster destroy and repair operators as well as two post-optimization components, which are both based on variable neighborhood descent. The first allows inter-route exchanges of complete clusters, while the second searches for intra-route improvements by combining classical neighborhoods (2-opt, Or-opt, double-bridge) and the Balas-Simo…

0209 industrial biotechnology021103 operations researchTheoretical computer scienceGeneral Computer ScienceHeuristic (computer science)Computer scienceHeuristic0211 other engineering and technologiesNeighborhood search02 engineering and technologyManagement Science and Operations ResearchVariable (computer science)020901 industrial engineering & automationModeling and SimulationVehicle routing problemBenchmark (computing)Cluster (physics)Descent (mathematics)Computers & Operations Research
researchProduct