Optimization Heuristics for Computing the Voronoi Skeleton

Author(s):  
Dmytro Kotsur ◽  
Vasyl Tereshchenko
2010 ◽  
Vol 54 (11) ◽  
pp. 2693-2706 ◽  
Author(s):  
M. Lyra ◽  
J. Paha ◽  
S. Paterlini ◽  
P. Winker

2019 ◽  
Vol 28 (09) ◽  
pp. 1950159 ◽  
Author(s):  
Junqiang Jiang ◽  
Wenbin Li ◽  
Li Pan ◽  
Bo Yang ◽  
Xin Peng

With the rapid development of commercialized computation, the heterogeneous computing system (HCS) has evolved into a new method of service provisioning based on utility computing models, in which the users consume services and resources based on their quality of service requirements. In certain models using the pay-as-you-go concept, the users are charged for accessed services based on their usage. In addition, the commercialized HCS provider also assumes the responsibility to reduce the energy consumption to protect the environment. This paper considers a basic model known as directed acyclic graphs (DAG), which is designed for workflow applications, and investigates heuristics that allows the scheduling of various tasks of a workflow into the dynamic voltage and frequency scaling enabled HCS. The proposed approaches, which are Minimum-Cost-Up-to-Budget (MCUB) and Maximum-Cost-Down-to-Budget (MCDB), could not only satisfy budget constrains but could also optimize overall energy consumption. The approaches along with their variants are implemented and evaluated using four types of basic DAGs. From the experimental results, we conclude that MCDB outperforms MCUB in energy optimization and makespan criterion while meeting budget constraints faced by users.


Author(s):  
Otokar Grošek ◽  
Pavol Zajac

Classical ciphers are used to encrypt plaintext messages written in a natural language in such a way that they are readable for sender or intended recipient only. Many classical ciphers can be broken by brute-force search through the key-space. Methods of artificial intelligence, such as optimization heuristics, can be used to narrow the search space, to speed-up text processing and text recognition in the cryptanalytic process. Here we present a broad overview of different AI techniques usable in cryptanalysis of classical ciphers. Specific methods to effectively recognize the correctly decrypted text among many possible decrypts are discussed in the next part Automated cryptanalysis – Language processing.


2012 ◽  
Vol 56 (10) ◽  
pp. 2963-2964
Author(s):  
Dietmar Maringer ◽  
Sandra Paterlini ◽  
Peter Winker

Sign in / Sign up

Export Citation Format

Share Document