Academic literature on the topic 'Worm Algorithm'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Worm Algorithm.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Worm Algorithm"
Rindlisbacher, Tobias, and Philippe de Forcrand. "Worm algorithm for theCPN−1model." Nuclear Physics B 918 (May 2017): 178–219. http://dx.doi.org/10.1016/j.nuclphysb.2017.02.021.
Full textGaofei, Zheng, Wang Xiufeng, and Zhang Yanli. "The self-organizing worm algorithm." Journal of Systems Engineering and Electronics 18, no. 3 (September 2007): 650–54. http://dx.doi.org/10.1016/s1004-4132(07)60143-1.
Full textDelgado, Y., and A. Schmidt. "Worm Algorithm for Abelian Gauge-Higgs Models." Acta Physica Polonica B Proceedings Supplement 6, no. 3 (2013): 911. http://dx.doi.org/10.5506/aphyspolbsupp.6.911.
Full textProkof'ev, N. V., B. V. Svistunov, and I. S. Tupitsyn. "“Worm” algorithm in quantum Monte Carlo simulations." Physics Letters A 238, no. 4-5 (February 1998): 253–57. http://dx.doi.org/10.1016/s0375-9601(97)00957-2.
Full textKerl, John. "A worm algorithm for random spatial permutations." Physics Procedia 4 (2010): 61–65. http://dx.doi.org/10.1016/j.phpro.2010.08.009.
Full textJanke, Wolfhard, Thomas Neuhaus, and Adriaan M. J. Schakel. "Critical loop gases and the worm algorithm." Nuclear Physics B 829, no. 3 (April 2010): 573–99. http://dx.doi.org/10.1016/j.nuclphysb.2009.12.024.
Full textYang, XinYu, Yi Shi, and HuiJun Zhu. "Detection and location algorithm against local-worm." Science in China Series F: Information Sciences 51, no. 12 (August 27, 2008): 1935–46. http://dx.doi.org/10.1007/s11432-008-0132-z.
Full textSalunkhe, Shamal, and Surendra Bhosale. "Nature Inspired Algorithm for Pixel Location Optimization in Video Steganography Using Deep RNN." International Journal on Engineering, Science and Technology 3, no. 2 (January 16, 2022): 146–54. http://dx.doi.org/10.46328/ijonest.67.
Full textWang, Yifan, Prathamesh Pandit, Akhil Kandhari, Zehao Liu, and Kathryn A. Daltorio. "Rapidly Exploring Random Tree Algorithm-Based Path Planning for Worm-Like Robot." Biomimetics 5, no. 2 (June 5, 2020): 26. http://dx.doi.org/10.3390/biomimetics5020026.
Full textHilool, Ali Khalid, Soukaena H. Hashem, and Shatha H. Jafer. "Intrusion detection system based on bagging with support vector machine." Indonesian Journal of Electrical Engineering and Computer Science 24, no. 2 (November 1, 2021): 1100. http://dx.doi.org/10.11591/ijeecs.v24.i2.pp1100-1106.
Full textDissertations / Theses on the topic "Worm Algorithm"
SILVA, Antônio Márcio Pereira. "Estudos sobre o modelo O(N) na rede quadrada e dinâmica de bolhas na célula de Hele-Shaw." Universidade Federal de Pernambuco, 2013. https://repositorio.ufpe.br/handle/123456789/17187.
Full textMade available in DSpace on 2016-06-29T13:52:59Z (GMT). No. of bitstreams: 2 license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) tese_final.pdf: 5635071 bytes, checksum: b300efb627e9ece412ad5936ab67e8e2 (MD5) Previous issue date: 2013-08-26
CNPq
No presente trabalho duas classes de problemas são abordadas. Primeiramente, são apresentados estudos computacionais sobre o modelo O(n) de spins na rede quadrada, e em seguida apresentamos novas soluções exatas para a dinâmica de bolhas na célula de Hele-Shaw. O estudo do modelo O(n) é feito utilizando sua representação em laços (cadeias fechadas), a qual é obtida a partir de uma expansão para altas temperaturas. Nesse representação, a função de partição do modelo possui uma expansão diagramática em que cada termo depende do número e comprimento total de laços e do número de (auto)interseções entre esses laços. Propriedades críticas do modelo de laços O(n) são obtidas através de conceitos oriundos da teoria de percolação. Para executar as simulações Monte Carlo, usamos o eficiente algoritmo WORM, o qual realiza atualizações locais através do movimento da extremidade de uma cadeia aberta denominada de verme e não sofre com o problema de "critical slowing down". Para implementar esse algoritmo de forma eficiente para o modelo O(n) na rede quadrada, fazemos uso de um nova estrutura de dados conhecida como listas satélites. Apresentamos estimativas para o ponto crítico do modelo para vários valores de n no intervalo de 0 < n ≤ 2. Usamos as estatísticas de laços e vermes para extrair, respectivamente, os expoentes críticos térmicos e magnéticos do modelo. No estudo de dinâmica de interfaces, apresentamos uma solução exata bastante geral para um arranjo periódico de bolhas movendo-se com velocidade constante ao longo de uma célula de Hele-Shaw. Usando a periodicidade da solução, o domínio relevante do problema pode ser reduzido a uma célula unitária que contém uma única bolha. Nenhuma imposição de simetria sobre forma da bolha é feita, de modo que a solução é capaz de produzir bolhas completamente assimétricas. Nossa solução é obtida por métodos de transformações conformes entre domínios duplamente conexos, onde utilizamos a transformação de Schwarz-Christoffel generalizada para essa classe de domínios.
In this thesis two classes of problems are discussed. First, we present computational studies of the O(n) spin model on the square lattice and determine its critical properties, whereas in the second part of the thesis we present new exact solutions for bubble dynamics in a Hele-Shaw cell. The O(n) model is investigated by using its loop representation which is obtained from a high-temperature expansion of the original model. In this representation, the partition function admits an diagrammatic expansion in which each term depends on the number and total length of loops (closed graphs) as well as on the number of intersections between these loops. Critical properties of the O(n) model are obtained by employing concepts from percolation theory. To perform Monte Carlo simulations of the model, we use the WORM algorithm, which is an efficient algorithm that performs local updates through the motion of one of the ends (called head) of an open chain (called worm) and hence does not suffer from “critical slowing down”. To implement this algorithm efficiently for the O(n) model on the square lattice, we make use of a new data structure known as a satellite list. We present estimates for the critical point of the model for various values of n in the range 0 < n ≤ 2. We use the statistics about the loops and the worm to extract the thermal and magnetic critical exponents of the model, respectively. In our study about interface dynamics, we present a rather general exact solution for a periodic array of bubbles moving with constant velocity in a Hele-Shaw cell. Using the periodicity of the solution, the relevant domain of the problem can be reduced to a unit cell containing a single bubble. No symmetry requirement is imposed on the bubble shape, so that the solution is capable of generating completely asymmetrical bubbles. Our solution is obtained by using conformal mappings between doubly-connected domains and employing the generalized Schwarz-Christoffel formula for this class of domains.
Meier, Hannes. "Phase transitions in novel superfluids and systems with correlated disorder." Doctoral thesis, KTH, Statistisk fysik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-160929.
Full textQC 20150306
Saccani, Sebastiano. "Quantum Monte Carlo studies of soft Bosonic systems and Minimum Energy Pathways." Doctoral thesis, SISSA, 2013. http://hdl.handle.net/20.500.11767/4931.
Full textOhlsson, Patrik. "Computer Assisted Music Creation : A recollection of my work and thoughts on heuristic algorithms, aesthetics, and technology." Thesis, Kungl. Musikhögskolan, Institutionen för komposition, dirigering och musikteori, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kmh:diva-2090.
Full textStadtherr, Hans. "Work efficient parallel scheduling algorithms." [S.l. : s.n.], 1998. http://deposit.ddb.de/cgi-bin/dokserv?idn=962681369.
Full textThakkar, Darshan Suresh, and darshanst@gmail com. "FPGA Implementation of Short Word-Length Algorithms." RMIT University. Electrical and Computer Engineering, 2008. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20080806.140908.
Full textCECCHINI, FLAVIO MASSIMILIANO. "Graph-based Clustering Algorithms for Word Sense Induction." Doctoral thesis, Università degli Studi di Milano-Bicocca, 2017. http://hdl.handle.net/10281/151635.
Full textThis dissertation is about Word Sense Induction (WSI), a branch of Natural Language Processing concerned with the automated, unsupervised detection and listing of the possible senses that a word can assume relative to the different contexts in which it appears. To this end, no external resources like dictionaries or ontologies are used. Among the many existing approaches to WSI, we focus specifically on modelling the context of a word through a graph and on running a clustering algorithm on it: the resulting clusters are interpreted as implicitly describing the possible senses of the word. Fundamental notions of WSI, basic concepts and some WSI approaches selected from literature are presented and examined in the first part of this work. In the second part, we introduce our threefold contribution. Firstly, we define and explore a weighted (together with an unweighted) Jaccard distance, i.e. a distance on the nodes of a positively weighted undirected graph which we use to obtain second-order relations from the first-order ones modelled by the graph (e.g. co-occurrences). Moreover, we define the related notion of gangplank edge, a separator edge with weight greater than the mean weights of the edges incident to either of its two ends, and finally a new synthetic interpretation of the curvature on a graph, seen as the difference between weighted and unweighted Jaccard distances between node couples. Our Jaccard distance is at the basis of the second contribution: three novel graph-based clustering algorithms expressly created for the task of WSI, respectively the gangplank clustering algorithm, an aggregative clustering algorithm and a curvature-based clustering algorithm. The third contribution is a novel evaluation framework for graph-based clustering algorithms for WSI, consisting of two word graph data sets (one for co-occurrences and one for semantic similarities) and a new ad hoc evaluation measure built around pseudowords. A pseudoword is the artificial conflation of two existing words, used as an ambiguous word whose (pseudo)senses are perfectly known. This enables to evaluate WSI algorithms on an easily creatable and expandable data set. We carry out a pseudoword-based evaluation for a number of graph-based clustering algorithms, including our three proposed systems. The investigation of how the parameters of a pseudoword affect an algorithm's outcomes, the comparison of the scores obtained by different evaluation metrics together with the detection of their biases, the size of the clusterings and the trends put in evidence by the hyperclustering step, the influence of the type of a word graph (based on semantic similarities or co-occurrences) on the output of an algorithm - all these factors, preceded by the comprehensive description of the task and the definition of novel concepts and instruments to tackle it, concur to give a deeper insight into the functioning and pitfalls of graph-based Word Sense Induction. We highlight and isolate the elements that determine how the results of an algorithm look like, discuss their properties and behaviours in relation to the word graph features and establish the pro and contra of each algorithm. Our analysis provides an experimental compass that helps pinpoint the right characteristics required by a clustering algorithm for the task of Word Sense Induction, and that helps orient the construction of a word graph. In particular, we have put in evidence the different syntagmatic versus paradigmatic contrast inherent to word graphs based on co-occurrences and semantic similarities.
Costa, Karine Piacentini Coelho da. "Estudo do modelo de Bose-Hubbard usando o algoritmo Worm." Universidade de São Paulo, 2011. http://www.teses.usp.br/teses/disponiveis/43/43134/tde-27022012-085711/.
Full textThis work study the two-dimensional ultracold bosonic atoms loaded in a square optical lattice, without harmonic confinement. The dynamics of this system is described by the Bose-Hubbard model, which predicts a quantum phase transition from a superfluid to a Mott-insulator at low temperatures that can be induced by varying the depth of the optical potential. We present here the phase diagram of this transition built from a mean field approach and from a numerical calculation using a Quantum Monte Carlo algorithm, namely the Worm algorithm. We found the critical transition point for the first Mott lobe in both cases, in agreement with the standard literature.
Embretsén, Stefan. "Modifying a pure pursuit algorithm to work in three dimensions." Thesis, Umeå universitet, Institutionen för datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-142508.
Full textChen, Wen-Tsong. "Word level training of handwritten word recognition systems /." free to MU campus, to others for purchase, 2000. http://wwwlib.umi.com/cr/mo/fullcit?p9974612.
Full textBooks on the topic "Worm Algorithm"
Eneko, Agirre, and Edmonds Philip Glenny, eds. Word sense disambiguation: Algorithms and applications. [New York]: Springer, 2007.
Find full text1948-, Apostolico Alberto, Galil Zvi, and North Atlantic Treaty Organization. Scientific Affairs Division., eds. Combinatorial algorithms on words. Berlin: Springer-Verlag, 1985.
Find full textRosenberg, Jonathan B. How Debuggers work: Algorithms, data structures, and architecture. New York: John Wiley, 1996.
Find full textSachs, Sarah Elizabeth. The Algorithm at Work: The Reconfiguration of Work and Expertise in the Making of Similarity in Art Data. [New York, N.Y.?]: [publisher not identified], 2019.
Find full textPotts, Christopher Nigel. Approximation algorithms for schedeling a single machine to minimize total late work. Fontainebleau: INSEAD, 1991.
Find full textCloughley, William R. Evaluation of work distribution algorithms and hardware topologies in a multi-Transputer network. Monterey, California: Naval Postgraduate School, 1988.
Find full textSpeed arithmetic: Based on Vedic word-formulas. 3rd ed. Chennai: Vijaya Ramasubban, 2008.
Find full textXie, Shane. Rapid One-of-a-kind Product Development: Strategies, Algorithms and Tools. London: Springer-Verlag London, 2011.
Find full textHughes, Roland. The Minimum You Need to Know about Logic to Work in It. USA: Logikal Solutions, 2007.
Find full textMundel, Marvin Everett. The white-collar knowledge worker: Measuring and improving productivity and effectiveness : algorithms and PC programs. [Tokyo, Japan]: Asian Productivity Organization, 1989.
Find full textBook chapters on the topic "Worm Algorithm"
Brabazon, Anthony, and Seán McGarraghy. "Worm Foraging Algorithm." In Natural Computing Series, 253–62. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-59156-8_13.
Full textProkof’ev, Nikolay. "Diagrammatic Monte Carlo and Worm Algorithm Techniques." In Springer Series in Solid-State Sciences, 273–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-35106-8_10.
Full textLim, Donghyun, Jinwook Chung, and Seongjin Ahn. "Using Genetic Algorithm for Network Status Learning and Worm Virus Detection Scheme." In Intelligent Data Engineering and Automated Learning – IDEAL 2006, 444–53. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11875581_54.
Full textGonzalez-Gomez, J., I. Gonzalez, F. Gomez-Arribas, and E. Boemo. "Evaluation of a Locomotion Algorithm for Worm-Like Robots on FPGA-Embedded Processors." In Reconfigurable Computing: Architectures and Applications, 24–29. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11802839_4.
Full textKim, Jungwon, William O. Wilson, Uwe Aickelin, and Julie McLeod. "Cooperative Automated Worm Response and Detection ImmuNe ALgorithm(CARDINAL) Inspired by T-Cell Immunity and Tolerance." In Lecture Notes in Computer Science, 168–81. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11536444_13.
Full textBansal, Jagdish Chand, Prathu Bajpai, Anjali Rawat, and Atulya K. Nagar. "Conclusion and Further Research Directions." In Sine Cosine Algorithm for Optimization, 105–6. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-9722-8_6.
Full textMalitsky, Yuri. "Related Work." In Instance-Specific Algorithm Configuration, 7–14. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11230-5_2.
Full textGuan, Ji, Wang Fang, and Mingsheng Ying. "Robustness Verification of Quantum Classifiers." In Computer Aided Verification, 151–74. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81685-8_7.
Full textJarrahi, Mohammad Hossein, and Will Sutherland. "Algorithmic Management and Algorithmic Competencies: Understanding and Appropriating Algorithms in Gig Work." In Information in Contemporary Society, 578–89. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-15742-5_55.
Full textBarth, Lukas, Stephen G. Kobourov, and Sergey Pupyrev. "Experimental Comparison of Semantic Word Clouds." In Experimental Algorithms, 247–58. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07959-2_21.
Full textConference papers on the topic "Worm Algorithm"
Khan, Aarfa, Shweta Shrivastava, and Vineet Richariya. "Normalized Worm-hole Local Intrusion Detection Algorithm(NWLIDA)." In 2014 International Conference on Computer Communication and Informatics (ICCCI). IEEE, 2014. http://dx.doi.org/10.1109/iccci.2014.6921748.
Full textWei Wang, Yingying Wang, Jinghao Qi, Houxiang Zhang, and Jianwei Zhang. "The CPG control algorithm for a climbing worm robot." In 2008 3rd IEEE Conference on Industrial Electronics and Applications (ICIEA). IEEE, 2008. http://dx.doi.org/10.1109/iciea.2008.4582600.
Full textZhang, Jie, Min-fang Peng, Liang Zhu, Hong-wei Che, and Jing-ying Hou. "Distribution Network Vulnerability Analysis Based on the Worm Algorithm." In 2016 International Conference on Electrical Engineering and Automation (EEA2016). WORLD SCIENTIFIC, 2017. http://dx.doi.org/10.1142/9789813220362_0054.
Full textMaillart, Vidushi, and Urs Wenger. "Worm algorithm for the O(2N) Gross-Neveu model." In The XXVIII International Symposium on Lattice Field Theory. Trieste, Italy: Sissa Medialab, 2011. http://dx.doi.org/10.22323/1.105.0257.
Full textXiao, Fengtao, Huaping Hu, Bo Liu, and Xin Chen. "PTBBWD: A Fast Process Traffic Behavior Based Worm Detection Algorithm." In 2008 International Seminar on Future Information Technology and Management Engineering. IEEE, 2008. http://dx.doi.org/10.1109/fitme.2008.150.
Full textGessner, Andrzej. "Theoretical Basis of Generation of Face Worm Gear Drive With Duplex Worm." In ASME 8th Biennial Conference on Engineering Systems Design and Analysis. ASMEDC, 2006. http://dx.doi.org/10.1115/esda2006-95519.
Full textXue, Li, and Zhihui Hu. "Research of Worm Intrusion Detection Algorithm Based on Statistical Classification Technology." In 2015 8th International Symposium on Computational Intelligence and Design (ISCID). IEEE, 2015. http://dx.doi.org/10.1109/iscid.2015.215.
Full textKang, Donghwa, Seoyeon Kim, Jinman Jung, Bongjae Kim, Hong Min, and Junyoung Heo. "Genetic algorithm based patching scheme for worm containment on social network." In SAC 2017: Symposium on Applied Computing. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3019612.3019912.
Full textBu, T., A. Chen, S. Vander Wiel, and T. Woo. "Design and Evaluation of a Fast and Robust Worm Detection Algorithm." In Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications. IEEE, 2006. http://dx.doi.org/10.1109/infocom.2006.100.
Full textKorzec, Tomasz, and Ulli Wolff. "A worm-inspired algorithm for the simulation of Abelian gauge theories." In The XXVIII International Symposium on Lattice Field Theory. Trieste, Italy: Sissa Medialab, 2011. http://dx.doi.org/10.22323/1.105.0029.
Full textReports on the topic "Worm Algorithm"
Allende López, Marcos, Diego López, Sergio Cerón, Antonio Leal, Adrián Pareja, Marcelo Da Silva, Alejandro Pardo, et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, June 2021. http://dx.doi.org/10.18235/0003313.
Full textStriuk, Andrii, Olena Rybalchenko, and Svitlana Bilashenko. Development and Using of a Virtual Laboratory to Study the Graph Algorithms for Bachelors of Software Engineering. [б. в.], November 2020. http://dx.doi.org/10.31812/123456789/4462.
Full textBoman, Erik G., Umit V. Catalyurek, Cedric Chevalier, Karen D. Devine, Assefaw H. Gebremedhin, Paul D. Hovland, Alex Pothen, et al. Combinatorial Algorithms to Enable Computational Science and Engineering: Work from the CSCAPES Institute. Office of Scientific and Technical Information (OSTI), January 2015. http://dx.doi.org/10.2172/1167393.
Full textLVOVICH, Ya, A. PREOBRAZHENSKIY, and Yu PREOBRAZHENSKIY. ANALYSIS OF TRANSPORT SYSTEM MANAGEMENT CAPABILITIES. Science and Innovation Center Publishing House, 2022. http://dx.doi.org/10.12731/2070-7568-2022-11-1-4-44-53.
Full textBaader, Franz, and Ralf Küsters. Matching Concept Descriptions with Existential Restrictions Revisited. Aachen University of Technology, 1999. http://dx.doi.org/10.25368/2022.98.
Full textBaader, Franz, and Ralf Küsters. Matching Concept Descriptions with Existential Restrictions Revisited. Aachen University of Technology, 1999. http://dx.doi.org/10.25368/2022.98.
Full textKüsters, Ralf, and Ralf Molitor. Computing Least Common Subsumers in ALEN. Aachen University of Technology, 2000. http://dx.doi.org/10.25368/2022.110.
Full textKüsters, Ralf, and Ralf Molitor. Computing Least Common Subsumers in ALEN. Aachen University of Technology, 2000. http://dx.doi.org/10.25368/2022.110.
Full textAyoul-Guilmard, Q., S. Ganesh, M. Nuñez, R. Tosi, F. Nobile, R. Rossi, and C. Soriano. D5.3 Report on theoretical work to allow the use of MLMC with adaptive mesh refinement. Scipedia, 2021. http://dx.doi.org/10.23967/exaqute.2021.2.002.
Full textHodgdon, Taylor, Anthony Fuentes, Jason Olivier, Brian Quinn, and Sally Shoop. Automated terrain classification for vehicle mobility in off-road conditions. Engineer Research and Development Center (U.S.), April 2021. http://dx.doi.org/10.21079/11681/40219.
Full text