Journal articles on the topic 'Oracle based algorithms'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Oracle based algorithms.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Zhao, Jiahao. "Possible Implementations of Oracles in Quantum Algorithms." Journal of Physics: Conference Series 2386, no. 1 (December 1, 2022): 012010. http://dx.doi.org/10.1088/1742-6596/2386/1/012010.
Full textHou, Wenjun, and Marek Perkowski. "Quantum-based algorithm and circuit design for bounded Knapsack optimization problem." Quantum Information and Computation 20, no. 9&10 (August 2020): 766–86. http://dx.doi.org/10.26421/qic20.9-10-4.
Full textKämmerling, Nicolas, and Jannis Kurtz. "Oracle-based algorithms for binary two-stage robust optimization." Computational Optimization and Applications 77, no. 2 (June 23, 2020): 539–69. http://dx.doi.org/10.1007/s10589-020-00207-w.
Full textZhandry, Mark. "Secure identity-based encryption in the quantum random oracle model." International Journal of Quantum Information 13, no. 04 (June 2015): 1550014. http://dx.doi.org/10.1142/s0219749915500148.
Full textLi, Liyi, Finn Voichick, Kesha Hietala, Yuxiang Peng, Xiaodi Wu, and Michael Hicks. "Verified compilation of Quantum oracles." Proceedings of the ACM on Programming Languages 6, OOPSLA2 (October 31, 2022): 589–615. http://dx.doi.org/10.1145/3563309.
Full textWang, Mengru, Yu Cai, Li Gao, Ruichen Feng, Qingju Jiao, Xiaolin Ma, and Yu Jia. "Study on the evolution of Chinese characters based on few-shot learning: From oracle bone inscriptions to regular script." PLOS ONE 17, no. 8 (August 19, 2022): e0272974. http://dx.doi.org/10.1371/journal.pone.0272974.
Full textMirhosseini, Seyyed Mohsen, and Hassan Haghighi. "Application of the Shuffled Frog Leaping Algorithm (SFLA) in Constructing Fuzzy Classification Systems." International Journal of Computational Intelligence and Applications 18, no. 03 (September 2019): 1950019. http://dx.doi.org/10.1142/s1469026819500196.
Full textParis, Matteo G. A., Claudia Benedetti, and Stefano Olivares. "Improving Quantum Search on Simple Graphs by Pretty Good Structured Oracles." Symmetry 13, no. 1 (January 7, 2021): 96. http://dx.doi.org/10.3390/sym13010096.
Full textParis, Matteo G. A., Claudia Benedetti, and Stefano Olivares. "Improving Quantum Search on Simple Graphs by Pretty Good Structured Oracles." Symmetry 13, no. 1 (January 7, 2021): 96. http://dx.doi.org/10.3390/sym13010096.
Full textYang, Zhen-Ping, Yuliang Wang, and Gui-Hua Lin. "Variance-Based Modified Backward-Forward Algorithm with Line Search for Stochastic Variational Inequality Problems and Its Applications." Asia-Pacific Journal of Operational Research 37, no. 03 (April 29, 2020): 2050011. http://dx.doi.org/10.1142/s0217595920500116.
Full textShah, Dhruti, Tuhinangshu Choudhury, Nikhil Karamchandani, and Aditya Gopalan. "Sequential Mode Estimation with Oracle Queries." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 04 (April 3, 2020): 5644–51. http://dx.doi.org/10.1609/aaai.v34i04.6018.
Full textYuan, Yunzhe, Yong Jiang, and Kewei Tu. "Bidirectional Transition-Based Dependency Parsing." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 7434–41. http://dx.doi.org/10.1609/aaai.v33i01.33017434.
Full textChen, Jian, Danni Wang, and Lin Qiao. "Implementation of micro application storage with high reliability based on Oracle 12c." MATEC Web of Conferences 272 (2019): 01053. http://dx.doi.org/10.1051/matecconf/201927201053.
Full textAddanki, Raghavendra, Sainyam Galhotra, and Barna Saha. "How to design robust algorithms using noisy comparison Oracle." Proceedings of the VLDB Endowment 14, no. 10 (June 2021): 1703–16. http://dx.doi.org/10.14778/3467861.3467862.
Full textBEGGS, EDWIN J., JOSÉ FÉLIX COSTA, and JOHN V. TUCKER. "The impact of models of a physical oracle on computational power." Mathematical Structures in Computer Science 22, no. 5 (September 6, 2012): 853–79. http://dx.doi.org/10.1017/s0960129511000557.
Full textSoni, Kapil Kumar, and Akhtar Rasool. "Quantum-effective exact multiple patterns matching algorithms for biological sequences." PeerJ Computer Science 8 (May 12, 2022): e957. http://dx.doi.org/10.7717/peerj-cs.957.
Full textChang, Seunghwan, Hyang-Sook Lee, Juhee Lee, and Seongan Lim. "Security Analysis of a Certificateless Signature from Lattices." Security and Communication Networks 2017 (2017): 1–7. http://dx.doi.org/10.1155/2017/3413567.
Full textShao, Changpeng. "Quantum speedup of training radial basis function networks." Quantum Information and Computation 19, no. 7&8 (June 2019): 609–25. http://dx.doi.org/10.26421/qic19.7-8-6.
Full textDohotaru, C., and P. Hoyer. "Exact quantum lower bound for Grover's problem." Quantum Information and Computation 9, no. 5&6 (May 2009): 533–40. http://dx.doi.org/10.26421/qic10.5-6-12.
Full textDohotaru, C., and P. Hoyer. "Exact quantum lower bound for Grover's problem." Quantum Information and Computation 11, no. 5&6 (May 2009): 533–40. http://dx.doi.org/10.26421/qic9.5-6-12.
Full textWang, Daochen, Xuchen You, Tongyang Li, and Andrew M. Childs. "Quantum Exploration Algorithms for Multi-Armed Bandits." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 11 (May 18, 2021): 10102–10. http://dx.doi.org/10.1609/aaai.v35i11.17212.
Full textChakraborty, Sanjay, Soharab Hossain Shaikh, Sudhindu Bikash Mandal, Ranjan Ghosh, and Amlan Chakrabarti. "A study and analysis of a discrete quantum walk-based hybrid clustering approach using d-regular bipartite graph and 1D lattice." International Journal of Quantum Information 17, no. 02 (March 2019): 1950016. http://dx.doi.org/10.1142/s0219749919500163.
Full textZhang, Youzhi, Bo An, and Jakub Černý. "Computing Ex Ante Coordinated Team-Maxmin Equilibria in Zero-Sum Multiplayer Extensive-Form Games." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 6 (May 18, 2021): 5813–21. http://dx.doi.org/10.1609/aaai.v35i6.16728.
Full textTeşileanu, Tiberiu, Siavash Golkar, Samaneh Nasiri, Anirvan M. Sengupta, and Dmitri B. Chklovskii. "Neural Circuits for Dynamics-Based Segmentation of Time Series." Neural Computation 34, no. 4 (March 23, 2022): 891–938. http://dx.doi.org/10.1162/neco_a_01476.
Full textEne, Alina, and Huy Lê Nguyễn. "Adaptive and Universal Algorithms for Variational Inequalities with Optimal Convergence." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 6 (June 28, 2022): 6559–67. http://dx.doi.org/10.1609/aaai.v36i6.20609.
Full textHu, Yue, Daniel Harabor, Long Qin, and Quanjun Yin. "Regarding Goal Bounding and Jump Point Search." Journal of Artificial Intelligence Research 70 (February 10, 2021): 631–81. http://dx.doi.org/10.1613/jair.1.12255.
Full textBeggs, Edwin, José Félix Costa, Bruno Loff, and J. V. Tucker. "Computational complexity with experiments as oracles. II. Upper bounds." Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences 465, no. 2105 (February 25, 2009): 1453–65. http://dx.doi.org/10.1098/rspa.2008.0412.
Full textDong, Minggang, Ning Wang, Xiaohui Cheng, and Chuanxian Jiang. "Composite Differential Evolution with Modified Oracle Penalty Method for Constrained Optimization Problems." Mathematical Problems in Engineering 2014 (2014): 1–15. http://dx.doi.org/10.1155/2014/617905.
Full textAsghar, Hassan Jameel, and Dali Kaafar. "Averaging Attacks on Bounded Noise-based Disclosure Control Algorithms." Proceedings on Privacy Enhancing Technologies 2020, no. 2 (April 1, 2020): 358–78. http://dx.doi.org/10.2478/popets-2020-0031.
Full textJarrar, Mustafa, and Anton Deik. "The Graph Signature." International Journal on Semantic Web and Information Systems 11, no. 2 (April 2015): 36–65. http://dx.doi.org/10.4018/ijswis.2015040102.
Full textRenner, Julian, Sven Puchinger, and Antonia Wachter-Zeh. "LIGA: a cryptosystem based on the hardness of rank-metric list and interleaved decoding." Designs, Codes and Cryptography 89, no. 6 (April 18, 2021): 1279–319. http://dx.doi.org/10.1007/s10623-021-00861-z.
Full textDress, Andreas, Stefan Grünewald, and Zhenbing Zeng. "A cognitive network for oracle bone characters related to animals." International Journal of Modern Physics B 30, no. 04 (February 10, 2016): 1630001. http://dx.doi.org/10.1142/s0217979216300012.
Full textLiu, Hui, Fukun Li, and Yilin Fan. "Optimizing the Quantum Circuit for Solving Boolean Equations Based on Grover Search Algorithm." Electronics 11, no. 15 (August 8, 2022): 2467. http://dx.doi.org/10.3390/electronics11152467.
Full textBen-David, Noa, and Sivan Sabato. "A Fast Algorithm for PAC Combinatorial Pure Exploration." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 6 (June 28, 2022): 6064–71. http://dx.doi.org/10.1609/aaai.v36i6.20553.
Full textFerrari, Davide, and Michele Amoretti. "Efficient and effective quantum compiling for entanglement-based machine learning on IBM Q devices." International Journal of Quantum Information 16, no. 08 (December 2018): 1840006. http://dx.doi.org/10.1142/s0219749918400063.
Full textMEER, KLAUS. "SOME INITIAL THOUGHTS ON BOUNDED QUERY COMPUTATIONS OVER THE REALS." International Journal of Foundations of Computer Science 23, no. 07 (November 2012): 1499–510. http://dx.doi.org/10.1142/s0129054112400618.
Full textYe, Honghan, Xinyuan Wei, Xindong Zhuang, and Enming Miao. "An Improved Robust Thermal Error Prediction Approach for CNC Machine Tools." Machines 10, no. 8 (July 29, 2022): 624. http://dx.doi.org/10.3390/machines10080624.
Full textRiccio, Vincenzo, Gunel Jahangirova, Andrea Stocco, Nargiz Humbatova, Michael Weiss, and Paolo Tonella. "Testing machine learning based systems: a systematic mapping." Empirical Software Engineering 25, no. 6 (September 15, 2020): 5193–254. http://dx.doi.org/10.1007/s10664-020-09881-0.
Full textEufinger, Lars, Jannis Kurtz, Christoph Buchheim, and Uwe Clausen. "A Robust Approach to the Capacitated Vehicle Routing Problem with Uncertain Costs." INFORMS Journal on Optimization 2, no. 2 (January 2020): 79–95. http://dx.doi.org/10.1287/ijoo.2019.0021.
Full textVan Aken, Dana, Dongsheng Yang, Sebastien Brillard, Ari Fiorino, Bohan Zhang, Christian Bilien, and Andrew Pavlo. "An inquiry into machine learning-based automatic configuration tuning services on real-world database management systems." Proceedings of the VLDB Endowment 14, no. 7 (March 2021): 1241–53. http://dx.doi.org/10.14778/3450980.3450992.
Full textYang, Nan, and Youliang Tian. "Identity-Based Unidirectional Collusion-Resistant Proxy Re-Encryption from U-LWE." Security and Communication Networks 2023 (January 3, 2023): 1–9. http://dx.doi.org/10.1155/2023/3765934.
Full textXie, Yi-Yang, Xiu-Bo Chen, and Yi-Xian Yang. "A New Lattice-Based Blind Ring Signature for Completely Anonymous Blockchain Transaction Systems." Security and Communication Networks 2022 (September 1, 2022): 1–12. http://dx.doi.org/10.1155/2022/4052029.
Full textHuixian, Li, Gao Jin, Wang Lingyun, and Pang Liaojun2. "MPKC-based Threshold Proxy Signcryption Scheme." International Arab Journal of Information Technology 17, no. 2 (February 28, 2019): 196–206. http://dx.doi.org/10.34028/iajit/17/2/7.
Full textZhou, Xiaoli, Hongqiang Wang, Yongqiang Cheng, Yuliang Qin, and Haowen Chen. "Radar Coincidence Imaging for Off-Grid Target Using Frequency-Hopping Waveforms." International Journal of Antennas and Propagation 2016 (2016): 1–16. http://dx.doi.org/10.1155/2016/8523143.
Full textGrottoli, Marco, Diane Cleij, Paolo Pretto, Yves Lemmens, Riender Happee, and Heinrich H. Bülthoff. "Objective evaluation of prediction strategies for optimization-based motion cueing." SIMULATION 95, no. 8 (December 6, 2018): 707–24. http://dx.doi.org/10.1177/0037549718815972.
Full textChoudhury, Sanjiban, Mohak Bhardwaj, Sankalp Arora, Ashish Kapoor, Gireeja Ranade, Sebastian Scherer, and Debadeepta Dey. "Data-driven planning via imitation learning." International Journal of Robotics Research 37, no. 13-14 (July 12, 2018): 1632–72. http://dx.doi.org/10.1177/0278364918781001.
Full textGOMES, ANA SOFIA, JOSÉ JÚLIO ALFERES, and TERRANCE SWIFT. "A goal-directed implementation of query answering for hybrid MKNF knowledge bases." Theory and Practice of Logic Programming 14, no. 2 (January 18, 2013): 239–64. http://dx.doi.org/10.1017/s1471068412000439.
Full textLi, Cheng, Wenxin Jiang, and Martin A. Tanner. "GENERAL INEQUALITIES FOR GIBBS POSTERIOR WITH NONADDITIVE EMPIRICAL RISK." Econometric Theory 30, no. 6 (April 16, 2014): 1247–71. http://dx.doi.org/10.1017/s0266466614000152.
Full textGao, Peng, Yiwei Li, Marek Perkowski, and Xiaoyu Song. "Realization of Quantum Oracles using Symmetries of Boolean Functions." Quantum Information and Computation 20, no. 5&6 (May 2020): 418–48. http://dx.doi.org/10.26421/qic20.5-6-4.
Full textHu, Huidan, Yuanjian Zhou, Zhenfu Cao, and Xiaolei Dong. "Efficient and HRA Secure Universal Conditional Proxy Re-Encryption for Cloud-Based Data Sharing." Applied Sciences 12, no. 19 (September 24, 2022): 9586. http://dx.doi.org/10.3390/app12199586.
Full text