Computer Science

All posts under tag "Computer Science"

248 posts total
Sorted by date
Adaptive Hierarchical Evaluation of LLMs and SAST tools for CWE Prediction in Python

Adaptive Hierarchical Evaluation of LLMs and SAST tools for CWE Prediction in Python

๋ณธ ๋…ผ๋ฌธ์€ LLM๊ณผ ์ „ํ†ต์ ์ธ ์ •์  ๋ถ„์„ ๋„๊ตฌ(SAST)์˜ ์ทจ์•ฝ์  ํƒ์ง€ ๋Šฅ๋ ฅ์„ ๋น„๊ต ํ‰๊ฐ€ํ•˜๊ธฐ ์œ„ํ•ด ์ƒˆ๋กœ์šด ๋ฒค์น˜๋งˆํฌ ํ”„๋ ˆ์ž„์›Œํฌ์ธ ALPHA๋ฅผ ์„ค๊ณ„ํ•œ ์ ์—์„œ ํ•™์ˆ ์ ยท์‹ค๋ฌด์  ์˜์˜๊ฐ€ ํฌ๋‹ค. ๊ธฐ์กด์˜ ์ด์ง„ ๋ถ„๋ฅ˜ ๊ธฐ๋ฐ˜ ๋ฒค์น˜๋งˆํฌ๋Š” โ€œ์ทจ์•ฝ์  ์กด์žฌ ์—ฌ๋ถ€โ€๋งŒ์„ ํŒ๋‹จํ•˜๋„๋ก ์ œํ•œ๋ผ, ๊ฐœ๋ฐœ์ž๊ฐ€ ์‹ค์ œ ์ฝ”๋“œ ์ˆ˜์ •์— ํ™œ์šฉํ•  ์ˆ˜ ์žˆ๋Š” ๊ตฌ์ฒด์ ์ธ CWE(CWEโ€‘Common Weakness Enumeration) ์ •๋ณด๋ฅผ ์ œ๊ณตํ•˜์ง€ ๋ชปํ•œ๋‹ค๋Š” ํ•œ๊ณ„๊ฐ€ ์žˆ์—ˆ๋‹ค. ALPHA๋Š” ์ด๋Ÿฌํ•œ ํ•œ๊ณ„๋ฅผ ๊ทน๋ณตํ•˜๊ธฐ ์œ„ํ•ด ํ•จ์ˆ˜ ์ˆ˜์ค€์—์„œ CWE ๋ ˆ์ด๋ธ”์„ ๋ถ€์—ฌํ•˜๊ณ , ์˜ค๋ฅ˜ ์œ ํ˜•์„ ์„ธ ๊ฐ€์ง€ ๊ณ„์ธต์  ํŒจ๋„ํ‹ฐ(

Computer Science Software Engineering
No Image

Harm in AI-Driven Societies: An Audit of Toxicity Adoption on Chirper.ai

๋ณธ ๋…ผ๋ฌธ์€ AI ๊ธฐ๋ฐ˜ ์†Œ์…œ ์—์ด์ „ํŠธ๊ฐ€ ์˜จ๋ผ์ธ ํ”Œ๋žซํผ์—์„œ ์–ด๋–ป๊ฒŒ ํ–‰๋™ํ•˜๋Š”์ง€์— ๋Œ€ํ•œ ๊นŠ์ด ์žˆ๋Š” ์ดํ•ด๋ฅผ ์ œ๊ณตํ•˜๋ฉฐ, ํŠนํžˆ ๋…์„ฑ ์ฝ˜ํ…์ธ  ์ƒ์„ฑ๊ณผ ๊ด€๋ จ๋œ ๋ฌธ์ œ์ ์„ ์ง‘์ค‘์ ์œผ๋กœ ๋ถ„์„ํ•œ๋‹ค. ์ด ์—ฐ๊ตฌ๋Š” Chirper.ai๋ผ๋Š” ํ”Œ๋žซํผ์„ ํ†ตํ•ด LLM ๊ธฐ๋ฐ˜ ์—์ด์ „ํŠธ์˜ ๋™์ž‘ ํŒจํ„ด์„ ๊ฒฝํ—˜์ ์œผ๋กœ ๊ฐ์‚ฌํ•˜๊ณ , ์ด๋Ÿฌํ•œ ์—์ด์ „ํŠธ๋“ค์ด ์–ด๋–ป๊ฒŒ ๋…์„ฑ์„ ์ƒ์„ฑํ•˜๊ณ  ์ฑ„ํƒํ•˜๋Š”์ง€์— ๋Œ€ํ•œ ์ค‘์š”ํ•œ ํ†ต์ฐฐ๋ ฅ์„ ์ œ๊ณตํ•œ๋‹ค. ๊ธฐ์ˆ ์  ํ˜์‹ ์„ฑ ๋ณธ ๋…ผ๋ฌธ์€ AI ๊ธฐ๋ฐ˜ ์†Œ์…œ ์—์ด์ „ํŠธ์˜ ํ–‰๋™ ์ดํ•ด๋ฅผ ์œ„ํ•œ ์ƒˆ๋กœ์šด ์ ‘๊ทผ๋ฒ•์„ ์ œ์‹œํ•œ๋‹ค. ํŠนํžˆ, Chirper.ai ํ”Œ๋žซํผ์„ ํ™œ์šฉํ•˜์—ฌ LLM ๊ธฐ๋ฐ˜ ์—์ด์ „ํŠธ๊ฐ€ ๋…์„ฑ ์ฝ˜

Computer Science Multiagent Systems
Measuring Social Media Polarization Using Large Language Models and Heuristic Rules

Measuring Social Media Polarization Using Large Language Models and Heuristic Rules

์ด ๋…ผ๋ฌธ์€ ๊ธฐ์กด ๊ฐ์„ฑ ๋ถ„์„์ด๋‚˜ ์‚ฌ์ „ ํ•™์Šต๋œ ๋ถ„๋ฅ˜๊ธฐ ์ค‘์‹ฌ์˜ ์–‘๊ทนํ™” ์—ฐ๊ตฌ์™€ ์ฐจ๋ณ„ํ™”๋˜๋Š” ๋‘ ๊ฐ€์ง€ ํ•ต์‹ฌ ์š”์†Œ๋ฅผ ์ œ์‹œํ•œ๋‹ค. ์ฒซ์งธ, ๋Œ€ํ˜• ์–ธ์–ด ๋ชจ๋ธ์„ ํ™œ์šฉํ•ด ํ…์ŠคํŠธ์—์„œ โ€˜์ž…์žฅ(stance)โ€™, โ€˜๊ฐ์ •์  ์–ด์กฐ(affective tone)โ€™, โ€˜๋™์˜ยท๋ฐ˜๋Œ€ ํŒจํ„ด(agreement dynamics)โ€™์„ ๋‹ค์ธต์ ์œผ๋กœ ์ถ”์ถœํ•œ๋‹ค๋Š” ์ ์ด๋‹ค. ๊ธฐ์กด ๋ฐฉ๋ฒ•์€ ์ฃผ๋กœ ๋‹จ์ผ ์ฐจ์›์˜ ๊ฐ์„ฑ ์ ์ˆ˜(๊ธ์ •/๋ถ€์ •) ํ˜น์€ ์‚ฌ์ „ ์ •์˜๋œ ๋ ˆ์ด๋ธ”(์ฐฌ์„ฑ/๋ฐ˜๋Œ€)๋งŒ์„ ์ œ๊ณตํ–ˆ์ง€๋งŒ, LLM์€ ๋ฌธ๋งฅ์„ ๊ณ ๋ คํ•ด ๋ฏธ๋ฌ˜ํ•œ ์ž…์žฅ ๋ณ€ํ™”๋ฅผ ํฌ์ฐฉํ•˜๊ณ , ๊ฐ์ •์˜ ๊ฐ•๋„์™€ ์œ ํ˜•(๋ถ„๋…ธ, ์Šฌํ””, ํ˜์˜ค ๋“ฑ)๊นŒ์ง€ ์„ธ๋ถ„ํ™”ํ•œ๋‹ค.

Computer Science Social Networks Model
Optimizing LSTM Neural Networks for Resource-Constrained Retail Sales Forecasting: A Model Compression Study

Optimizing LSTM Neural Networks for Resource-Constrained Retail Sales Forecasting: A Model Compression Study

์ด ๋…ผ๋ฌธ์€ ์†Œ๋งค ํŒ๋งค ์˜ˆ์ธก ๋ถ„์•ผ์—์„œ LSTM ๋„คํŠธ์›Œํฌ์˜ ํšจ์œจ์„ฑ๊ณผ ์ •ํ™•์„ฑ์„ ๊ทน๋Œ€ํ™”ํ•˜๋Š” ๋ฐฉ๋ฒ•์— ๋Œ€ํ•ด ๊นŠ์ด ์žˆ๊ฒŒ ํƒ๊ตฌํ•˜๊ณ  ์žˆ๋‹ค. ํŠนํžˆ, ์ด ์—ฐ๊ตฌ๋Š” ์ž์› ์ œ์•ฝ์„ ๊ฐ€์ง„ ์†Œ๊ทœ๋ชจ ๋ฐ ์ค‘์†Œ ๊ทœ๋ชจ ๋งค์žฅ์—์„œ๋„ ํšจ๊ณผ์ ์ธ AI ๊ธฐ๋ฐ˜ ์˜ˆ์ธก ์‹œ์Šคํ…œ์„ ๊ตฌ์ถ•ํ•  ์ˆ˜ ์žˆ๋„๋ก ํ•˜๋Š” ๋ชจ๋ธ ์••์ถ• ๊ธฐ๋ฒ•์˜ ์ค‘์š”์„ฑ์„ ๊ฐ•์กฐํ•œ๋‹ค. ๊ธฐ์ˆ ์  ํ˜์‹ ์„ฑ ์ด ๋…ผ๋ฌธ์€ LSTM ๋„คํŠธ์›Œํฌ๋ฅผ ์••์ถ•ํ•˜๋Š” ๋‹ค์–‘ํ•œ ๋ฐฉ๋ฒ•๋ก ์„ ์ฒด๊ณ„์ ์œผ๋กœ ํ‰๊ฐ€ํ•˜๊ณ , ํŠนํžˆ 64๊ฐœ ์€๋‹‰ ์œ ๋‹›์„ ๊ฐ€์ง„ ๋ชจ๋ธ์ด ๊ฐ€์žฅ ๋†’์€ ์˜ˆ์ธก ์ •ํ™•๋„๋ฅผ ๋ณด์ด๋Š” ๊ฒƒ์„ ๋ฐœ๊ฒฌํ–ˆ๋‹ค. ์ด๋Š” ํ‘œ์ค€ LSTM(128๊ฐœ ์€๋‹‰ ์œ ๋‹›)๋ณด๋‹ค ๋ฉ”๋ชจ๋ฆฌ ์‚ฌ์šฉ๋Ÿ‰์„ ์ค„์ด๊ณ  ์ถ”๋ก 

Computer Science Network Machine Learning Model
Application of deep learning techniques in non-contrast computed tomography pulmonary angiogram for pulmonary embolism diagnosis

Application of deep learning techniques in non-contrast computed tomography pulmonary angiogram for pulmonary embolism diagnosis

๋ณธ ๋…ผ๋ฌธ์€ ์ž„์ƒ ํ˜„์žฅ์—์„œ ์กฐ์˜์ œ ์‚ฌ์šฉ์— ๋”ฐ๋ฅธ ๋ถ€์ž‘์šฉ๊ณผ ์‹œ๊ฐ„ ์ง€์—ฐ ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๊ณ ์ž, ๋น„์กฐ์˜ CT ์˜์ƒ๋งŒ์„ ์ด์šฉํ•ด ํ์ƒ‰์ „์ฆ์„ ์ž๋™์œผ๋กœ ํŒ๋ณ„ํ•˜๋Š” 3D ํ•ฉ์„ฑ๊ณฑ ์‹ ๊ฒฝ๋ง(3Dโ€‘CNN) ๋ชจ๋ธ์„ ๊ฐœ๋ฐœํ•˜์˜€๋‹ค. ๋จผ์ € ๋ฐ์ดํ„ฐ์…‹ ๊ตฌ์ถ• ๋‹จ๊ณ„์—์„œ ์กฐ์˜์ œ ์‚ฌ์šฉ์ด ๊ธˆ์ง€๋œ ํ™˜์ž๊ตฐ๊ณผ ๊ธฐ์กด CTPA ์˜์ƒ์—์„œ ๋ผ๋ฒจ๋ง๋œ ํ์ƒ‰์ „์ฆ ์‚ฌ๋ก€๋ฅผ ๋งค์นญ์‹œ์ผœ, ๋น„์กฐ์˜ CT์™€ ๋ผ๋ฒจ ์ •๋ณด๋ฅผ ์ผ์น˜์‹œ์ผฐ๋‹ค. ์ด๋Š” ๋ผ๋ฒจ๋ง ๋น„์šฉ์„ ํฌ๊ฒŒ ์ ˆ๊ฐํ•˜๋ฉด์„œ๋„ ์‹ค์ œ ์ž„์ƒ ์ƒํ™ฉ์„ ๋ฐ˜์˜ํ•œ ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค๋ฅผ ํ™•๋ณดํ•˜๋Š” ์ „๋žต์ด๋‹ค. ๋ชจ๋ธ ๊ตฌ์กฐ๋Š” ์ž…๋ ฅ ๋ณผ๋ฅจ์„ 3์ฐจ์›์œผ๋กœ ์ฒ˜๋ฆฌํ•˜์—ฌ ํํ˜ˆ๊ด€ ๋ฐ ์ฃผ๋ณ€ ์กฐ์ง์˜ ๋ฏธ์„ธํ•œ ๋ฐ€๋„ ์ฐจ์ด๋ฅผ

Computer Vision Computer Science Learning
No Image

FlashInfer-Bench: Building the Virtuous Cycle for AI-driven LLM Systems

FlashInferโ€‘Bench ๋…ผ๋ฌธ์€ โ€œAIโ€‘generated GPU kernelโ€์ด๋ผ๋Š” ์ตœ์‹  ์—ฐ๊ตฌ ํ๋ฆ„์„ ์‹ค์ œ ์„œ๋น„์Šค ํ™˜๊ฒฝ์— ์ ์šฉํ•˜๊ธฐ ์œ„ํ•œ ์ธํ”„๋ผ์ŠคํŠธ๋Ÿญ์ฒ˜ ์„ค๊ณ„๋ผ๋Š” ๊ด€์ ์—์„œ ๋งค์šฐ ์˜๋ฏธ ์žˆ๋Š” ๊ธฐ์—ฌ๋ฅผ ํ•˜๊ณ  ์žˆ๋‹ค. ์ฒซ ๋ฒˆ์งธ ํ•ต์‹ฌ์€ FlashInfer Trace ๋ผ๋Š” ๋ฉ”ํƒ€๋ฐ์ดํ„ฐ ์Šคํ‚ค๋งˆ์ด๋‹ค. ๊ธฐ์กด์— LLM์ด ์ƒ์„ฑํ•œ ์ฝ”๋“œ๋ฅผ ๋‹จ์ˆœํžˆ ํ…์ŠคํŠธ๋กœ ์ €์žฅํ•˜๊ณ  ์ธ๊ฐ„์ด ์ˆ˜๋™์œผ๋กœ ๊ฒ€์ฆํ•˜๋Š” ๋ฐฉ์‹์€ ํ™•์žฅ์„ฑ์ด ๋–จ์–ด์ง„๋‹ค. Trace๋Š” ์ปค๋„ ์ธํ„ฐํŽ˜์ด์Šค(์ž…์ถœ๋ ฅ ํ…์„œ ํ˜•ํƒœ, ๋ฉ”๋ชจ๋ฆฌ ์š”๊ตฌ๋Ÿ‰), ์›Œํฌ๋กœ๋“œ ํŠน์„ฑ(๋ฐฐ์น˜ ํฌ๊ธฐ, ์‹œํ€€์Šค ๊ธธ์ด), ๊ตฌํ˜„ ์„ธ๋ถ€์‚ฌํ•ญ(์–ธ์–ด, ์ปดํŒŒ์ผ ์˜ต์…˜)

Computer Science Artificial Intelligence System
Classifying long legal documents using short random chunks

Classifying long legal documents using short random chunks

์ด ๋…ผ๋ฌธ์€ ๋ฒ•๋ฅ  ๋ฌธ์„œ์™€ ๊ฐ™์ด ํ…์ŠคํŠธ ๊ธธ์ด๊ฐ€ ์ˆ˜์ฒœ ํ† ํฐ์— ๋‹ฌํ•˜๋Š” ๋„๋ฉ”์ธ์—์„œ Transformer ๋ชจ๋ธ์˜ ์ž…๋ ฅ ์ œํ•œ์„ ์šฐํšŒํ•˜๊ธฐ ์œ„ํ•œ ์‹ค์šฉ์ ์ธ ์ ‘๊ทผ๋ฒ•์„ ์ œ์‹œํ•œ๋‹ค. ๊ธฐ์กด ์—ฐ๊ตฌ๋“ค์€ ๋ณดํ†ต ์ „์ฒด ๋ฌธ์„œ๋ฅผ ์Šฌ๋ผ์ด๋”ฉ ์œˆ๋„์šฐ ๋ฐฉ์‹์œผ๋กœ ๋‚˜๋ˆ„๊ฑฐ๋‚˜, ํ•ต์‹ฌ ๋ฌธ์žฅ์„ ์ถ”์ถœํ•˜๋Š” ์ „์ฒ˜๋ฆฌ ๋‹จ๊ณ„์— ์˜์กดํ•œ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ์Šฌ๋ผ์ด๋”ฉ ์œˆ๋„์šฐ๋Š” ์—ฐ์‚ฐ๋Ÿ‰์ด ๊ธ‰์ฆํ•˜๊ณ , ํ•ต์‹ฌ ๋ฌธ์žฅ ์ถ”์ถœ์€ ๋„๋ฉ”์ธ ํŠนํ™”๋œ ์š”์•ฝ ๋ชจ๋ธ์ด ํ•„์š”ํ•ด ์ถ”๊ฐ€ ๋น„์šฉ์ด ๋ฐœ์ƒํ•œ๋‹ค. ์ €์ž๋“ค์€ ์ด๋Ÿฌํ•œ ๋ฌธ์ œ๋ฅผ โ€œ๋ฌด์ž‘์œ„ ์ฒญํฌ ์ƒ˜ํ”Œ๋งโ€์ด๋ผ๋Š” ๊ฐ„๋‹จํ•˜์ง€๋งŒ ํšจ๊ณผ์ ์ธ ์ „๋žต์œผ๋กœ ํ•ด๊ฒฐํ•œ๋‹ค. 48๊ฐœ์˜ ์ฒญํฌ๋ฅผ ๋ฌด์ž‘์œ„๋กœ ์„ ํƒํ•จ์œผ๋กœ์จ ๋ฌธ์„œ ์ „์ฒด์˜ ๋‹ค์–‘

Computer Science NLP
No Image

DynaFix: Iterative Automated Program Repair Driven by Execution-Level Dynamic Information

DynaFix๊ฐ€ ์ œ์‹œํ•˜๋Š” ํ•ต์‹ฌ ์•„์ด๋””์–ด๋Š” โ€œ์‹คํ–‰โ€‘๋ ˆ๋ฒจ ๋™์  ์ •๋ณดโ€๋ฅผ ๋ฐ˜๋ณต์ ์ธ ํ”ผ๋“œ๋ฐฑ ๋ฃจํ”„์— ํ†ตํ•ฉํ•จ์œผ๋กœ์จ LLM ๊ธฐ๋ฐ˜ APR์˜ ํ•œ๊ณ„๋ฅผ ๊ทน๋ณตํ•œ๋‹ค๋Š” ์ ์ด๋‹ค. ๊ธฐ์กด LLMโ€‘APR ์—ฐ๊ตฌ๋Š” ์ฃผ๋กœ ์ •์  ์ฝ”๋“œ ๊ตฌ์กฐ์™€ ํ…Œ์ŠคํŠธ ์Šค์œ„ํŠธ ๊ฒฐ๊ณผ์— ์˜์กดํ–ˆ์œผ๋ฉฐ, ์ด๋Š” ํ”„๋กœ๊ทธ๋žจ์˜ ์‹ค์ œ ๋™์ž‘์„ ๋ฐ˜์˜ํ•˜์ง€ ๋ชปํ•œ๋‹ค. ์ •์  ์ •๋ณด๋งŒ์œผ๋กœ๋Š” ๋ณ€์ˆ˜ ๊ฐ’์˜ ๋ณ€๋™, ์กฐ๊ฑด๋ฌธ ๋ถ„๊ธฐ, ์˜ˆ์™ธ ๋ฐœ์ƒ ๊ฒฝ๋กœ ๋“ฑ ๋ณต์žกํ•œ ๋Ÿฐํƒ€์ž„ ์ƒํ™ฉ์„ ์ •ํ™•ํžˆ ํŒŒ์•…ํ•˜๊ธฐ ์–ด๋ ต๋‹ค. DynaFix๋Š” ์ด๋Ÿฌํ•œ ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•ด ๋งค ๋ผ์šด๋“œ๋งˆ๋‹ค ํ”„๋กœ๊ทธ๋žจ์„ ์‹ค์ œ๋กœ ์‹คํ–‰ํ•˜๊ณ , ๋ณ€์ˆ˜ ์Šค๋ƒ…์ƒท, ์ œ์–ด ํ๋ฆ„ ํŠธ๋ ˆ์ด์Šค, ํ˜ธ์ถœ ์Šคํƒ ๋“ฑ

Computer Science Software Engineering
No Image

Factorized Learning for Temporally Grounded Video-Language Models

์ด ๋…ผ๋ฌธ์€ ๊ธฐ์กด ๋น„๋””์˜คโ€‘์–ธ์–ด ๋ชจ๋ธ์ด โ€œํ•œ ๋ฒˆ์— ์ „์ฒด ๋น„๋””์˜ค๋ฅผ ์š”์•ฝํ•˜๊ณ  ์งˆ๋ฌธ์— ๋‹ตํ•œ๋‹คโ€๋Š” ์ „ํ†ต์ ์ธ ํŒจ๋Ÿฌ๋‹ค์ž„์„ ํƒˆํ”ผํ•œ๋‹ค๋Š” ์ ์—์„œ ํฐ ์˜๋ฏธ๊ฐ€ ์žˆ๋‹ค. ๊ธฐ์กด ๋ฐฉ๋ฒ•๋“ค์€ ์ข…์ข… ์‹œ๊ฐ„์  ์ •๋ณด๋ฅผ ํ๋ฆฟํ•˜๊ฒŒ ์ฒ˜๋ฆฌํ•˜๊ฑฐ๋‚˜, ๊ทผ๊ฑฐ๊ฐ€ ๋˜๋Š” ์‹œ๊ฐ์  ์ฆ๊ฑฐ๋ฅผ ๋ช…์‹œ์ ์œผ๋กœ ์ œ์‹œํ•˜์ง€ ๋ชปํ•ด ํ•ด์„ ๊ฐ€๋Šฅ์„ฑ์ด ๋‚ฎ์•˜๋‹ค. ์ €์ž๋“ค์€ ์ด๋Ÿฌํ•œ ํ•œ๊ณ„๋ฅผ ๊ทน๋ณตํ•˜๊ธฐ ์œ„ํ•ด ๋‘ ๊ฐ€์ง€ ํ•ต์‹ฌ ์•„์ด๋””์–ด๋ฅผ ์ œ์‹œํ•œ๋‹ค. ์ฒซ ๋ฒˆ์งธ๋Š” generation objective์˜ factorization ์ด๋‹ค. ๋ชจ๋ธ์ด ๋จผ์ € โ€œ์–ด๋–ค ์‹œ๊ฐ„ ๊ตฌ๊ฐ„์ด ์งˆ๋ฌธ์— ๋Œ€ํ•œ ๊ทผ๊ฑฐ๊ฐ€ ๋˜๋Š”๊ฐ€โ€๋ฅผ ํŒ๋‹จํ•˜๊ณ , ๊ทธ ๊ตฌ๊ฐ„์— ํ•ด๋‹นํ•˜๋Š” evidence

Computer Science Model Learning Computer Vision
Unified Embodied VLM Reasoning with Robotic Action via Autoregressive Discretized Pre-training

Unified Embodied VLM Reasoning with Robotic Action via Autoregressive Discretized Pre-training

์ด ๋…ผ๋ฌธ์€ ๋กœ๋ด‡ ์กฐ์ž‘ ์‹œ์Šคํ…œ์ด ์ง๋ฉดํ•œ ๋‘ ๊ฐ€์ง€ ํ•ต์‹ฌ ๊ณผ์ œ, ์ฆ‰ โ€œ๋„“์€ ์˜๋ฏธ์  ์ผ๋ฐ˜ํ™”โ€์™€ โ€œ๊ณ ์ •๋ฐ€ ์—ฐ์† ์ œ์–ดโ€ ์‚ฌ์ด์˜ ๊ท ํ˜•์„ ์ •๋ฐ€ํ•˜๊ฒŒ ์ง„๋‹จํ•˜๊ณ  ํ•ด๊ฒฐ์ฑ…์„ ์ œ์‹œํ•œ๋‹ค๋Š” ์ ์—์„œ ํฐ ์˜๋ฏธ๊ฐ€ ์žˆ๋‹ค. ๋จผ์ € ERIQ(Embodied Reasoning Intelligence Quotient)๋ผ๋Š” ์ƒˆ๋กœ์šด ๋ฒค์น˜๋งˆํฌ๋ฅผ ๋„์ž…ํ–ˆ๋Š”๋ฐ, ์ด๋Š” ๊ธฐ์กด VLA ๋ชจ๋ธ ํ‰๊ฐ€๊ฐ€ โ€œ์ž…๋ ฅโ€‘์ถœ๋ ฅโ€ ํ˜•ํƒœ์˜ ์„ฑ๊ณต๋ฅ ์—๋งŒ ์ดˆ์ ์„ ๋งž์ถ”๋Š” ๋ฐ˜๋ฉด, ์งˆ๋ฌธโ€‘๋‹ต๋ณ€ ํ˜•ํƒœ์˜ 6์ฒœ ๊ฐœ ์ด์ƒ ๋ฐ์ดํ„ฐ์…‹์„ ํ†ตํ•ด โ€˜์ถ”๋ก  ๋‹จ๊ณ„โ€™๋ฅผ ๋ณ„๋„๋กœ ์ธก์ •ํ•œ๋‹ค๋Š” ์ ์ด ์ฐจ๋ณ„์ ์ด๋‹ค. ๋„ค ๊ฐ€์ง€ ์ถ”๋ก  ์ฐจ์›(์˜ˆ: ๋ฌผ์ฒด ๊ด€๊ณ„ ์ดํ•ด,

Computer Science Robotics
Quantum Private Information Retrieval with Sublinear Communication   Complexity

Quantum Private Information Retrieval with Sublinear Communication Complexity

๋ณธ ๋…ผ๋ฌธ์€ ์–‘์ž ๊ฐœ์ธ ์ •๋ณด ๊ฒ€์ƒ‰ ํ”„๋กœํ† ์ฝœ ์— ๋Œ€ํ•œ ์‹ฌ๋„ ์žˆ๋Š” ๋ถ„์„์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ์ด๋Š” ์„œ๋ฒ„๋กœ๋ถ€ํ„ฐ ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค ํ•ญ๋ชฉ์„ ๋น„๊ณต๊ฐœ๋กœ ๊ฒ€์ƒ‰ํ•˜๋Š” ๋ฐฉ๋ฒ•์œผ๋กœ, Chor, Kushilevitz, Goldreich ๋ฐ Sudan์˜ ์—ฐ๊ตฌ์—์„œ ์‹œ์ž‘๋œ ๋ถ„์•ผ์ž…๋‹ˆ๋‹ค. ๋ณธ ๋…ผ๋ฌธ์€ ๊ณต๊ฐœ ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค๊ฐ€ ๋ณดํŽธํ™”๋จ์— ๋”ฐ๋ผ ๋”์šฑ ์ค‘์š”ํ•ด์ง„ ์ด ์ฃผ์ œ๋ฅผ ๋‹ค๋ฃน๋‹ˆ๋‹ค. 1. ๊ฐœ์ธ ์ •๋ณด ๊ฒ€์ƒ‰ ํ”„๋กœํ† ์ฝœ์˜ ๋ฐฐ๊ฒฝ ๋ณธ ๋…ผ๋ฌธ์€ Chor, Kushilevitz, Goldreich ๋ฐ Sudan์˜ ์—ฐ๊ตฌ์—์„œ ์‹œ์ž‘๋œ ๊ฐœ์ธ ์ •๋ณด ๊ฒ€์ƒ‰ ๋ถ„์•ผ๋ฅผ ์†Œ๊ฐœํ•ฉ๋‹ˆ๋‹ค. ์ด๋Š” ์„œ๋ฒ„๋กœ๋ถ€ํ„ฐ ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค ํ•ญ๋ชฉ์„ ๋น„๊ณต๊ฐœ๋กœ

Computational Complexity Quantum Physics Computer Science Cryptography and Security
About set-theoretic properties of one-way functions

About set-theoretic properties of one-way functions

: 1. ๋ฌธ์ œ ์ •์˜ ๋ฐ ๋ฐฐ๊ฒฝ ์•”ํ˜ธํ™” ์‹œ์Šคํ…œ์€ ์ •๋ณด ๋ณด์•ˆ์— ํ•„์ˆ˜์ ์ด๋ฉฐ, ๊ทธ ์•ˆ์ •์„ฑ์€ NP ํด๋ž˜์Šค์™€ ๋ฐ€์ ‘ํ•œ ๊ด€๋ จ์ด ์žˆ๋‹ค. NP ํด๋ž˜์Šค๋Š” ํšจ์œจ์ ์ธ ๊ฒ€์ฆ ์•Œ๊ณ ๋ฆฌ์ฆ˜์ด ์กด์žฌํ•˜๋Š” ๋ฌธ์ œ๋“ค์˜ ์ง‘ํ•ฉ์„ ๋‚˜ํƒ€๋‚ด๋Š”๋ฐ, ์•”ํ˜ธํ™” ๊ณผ์ •์€ ๋ณธ์งˆ์ ์œผ๋กœ NP ๋ฌธ์ œ์— ํ•ด๋‹นํ•œ๋‹ค. ํ•œ ๋ฐฉํ–ฅ ํ•จ์ˆ˜๋Š” ์ž…๋ ฅ๊ฐ’์— ๋Œ€ํ•œ ์ถœ๋ ฅ๊ฐ’์„ ๊ณ„์‚ฐํ•˜๋Š” ๋ฐ๋Š” ํšจ์œจ์ ์ด์ง€๋งŒ, ๊ทธ ์—ญํ•จ์ˆ˜๋ฅผ ๊ณ„์‚ฐํ•˜๋Š” ๊ฒƒ์€ ๋น„ํšจ์œจ์ ์ด๊ฑฐ๋‚˜ ๋ถˆ๊ฐ€๋Šฅํ•˜๋‹ค. ์ด ํŠน์„ฑ ๋•Œ๋ฌธ์— ํ•œ ๋ฐฉํ–ฅ ํ•จ์ˆ˜๋Š” ์•”ํ˜ธํ™” ์‹œ์Šคํ…œ์—์„œ ์ค‘์š”ํ•œ ์—ญํ• ์„ ์ˆ˜ํ–‰ํ•œ๋‹ค. 2. ํ•œ ๋ฐฉํ–ฅ ํ•จ์ˆ˜์˜ ๊ฐœ๋… ๋ฐ ์ค‘์š”์„ฑ ํ•œ ๋ฐฉํ–ฅ ํ•จ์ˆ˜๋Š” ๋‹ค์Œ๊ณผ ๊ฐ™์€ ํŠน์„ฑ์„ ๊ฐ€์ง„๋‹ค: ํšจ์œจ์ ์ธ ๊ณ„์‚ฐ:

Computational Complexity Computer Science
Leveraging Billions of Faces to Overcome Performance Barriers in   Unconstrained Face Recognition

Leveraging Billions of Faces to Overcome Performance Barriers in Unconstrained Face Recognition

๋ณธ ๋…ผ๋ฌธ์€ face.com์—์„œ ๊ฐœ๋ฐœํ•œ ์–ผ๊ตด ์ธ์‹ ๊ธฐ์ˆ ์„ ํ†ตํ•ด ์ œ์•ฝ ์—†๋Š” ํ™˜๊ฒฝ์—์„œ์˜ ์–ผ๊ตด ์ธ์‹ ์„ฑ๋Šฅ์„ ํฌ๊ฒŒ ํ–ฅ์ƒ์‹œํ‚จ ๋‚ด์šฉ์„ ๋‹ค๋ฃน๋‹ˆ๋‹ค. ํŠนํžˆ, LFW(Labeled Faces in the Wild) ๋ฒค์น˜๋งˆํฌ๋ฅผ ์ด์šฉํ•ด ์ด์ „ ์—ฐ๊ตฌ๋ณด๋‹ค ๋†’์€ ์ •ํ™•๋„๋ฅผ ๋‹ฌ์„ฑํ•œ ์ ์ด ์ฃผ๋ชฉ๋ฐ›์Šต๋‹ˆ๋‹ค. 1. ๋ฒค์น˜๋งˆํฌ ๋ฐ ๊ฒฐ๊ณผ LFW๋Š” ์ œ์•ฝ ์—†๋Š” ์–ผ๊ตด ์ธ์‹ ๋ถ„์•ผ์˜ ํ‘œ์ค€ ํ…Œ์ŠคํŠธ ๋ฒ ๋“œ๋กœ, 3๋…„ ๋™์•ˆ 100ํšŒ ์ด์ƒ ์ธ์šฉ๋˜์—ˆ์Šต๋‹ˆ๋‹ค. ์ด ๋…ผ๋ฌธ์—์„œ๋Š” face.com์˜ r2011b1 ์—”์ง„์„ LFW์— ์ ์šฉํ•˜์—ฌ, ์‚ฌ์ „ ํŠœ๋‹ ์—†์ด๋„ ํ‰๊ท  ์ •ํ™•๋„ 91.3% ยฑ 0.3์„ ๋‹ฌ์„ฑํ–ˆ์Šต๋‹ˆ๋‹ค. ํŠนํžˆ

Computer Science Computer Vision
Cryptolysis v.0.0.1 - A Framework for Automated Cryptanalysis of   Classical Ciphers

Cryptolysis v.0.0.1 - A Framework for Automated Cryptanalysis of Classical Ciphers

๋ณธ ๋…ผ๋ฌธ์€ ๊ณ ์ „ ์•”ํ˜ธ ํ•ด๋…์„ ์ž๋™ํ™”ํ•˜๊ธฐ ์œ„ํ•ด ๊ฐœ๋ฐœ๋œ ํ”„๋ ˆ์ž„์›Œํฌ 'ํฌ๋ฆฝํ†จ๋ฆฌ์‹œ์Šค'์˜ ์„ค๊ณ„์™€ ๊ตฌํ˜„ ๋ฐฉ๋ฒ•์„ ์ƒ์„ธํžˆ ๋‹ค๋ฃจ๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ์ด ํ”„๋กœ์ ํŠธ๋Š” ์ž๋ฐ” ์–ธ์–ด๋ฅผ ๊ธฐ๋ฐ˜์œผ๋กœ ํ•˜๋ฉฐ, ๋ฉ”๋ชจ๋ฆฌ ๊ด€๋ฆฌ์™€ ์ปฌ๋ ‰์…˜ ๊ด€๋ฆฌ์˜ ์šฉ์ด์„ฑ ๋•๋ถ„์— ํšจ์œจ์ ์ธ ๊ฐœ๋ฐœ ํ™˜๊ฒฝ์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ์‹œ์Šคํ…œ ์•„ํ‚คํ…์ฒ˜ ํฌ๋ฆฝํ†จ๋ฆฌ์‹œ์Šค์˜ ์‹œ์Šคํ…œ ์•„ํ‚คํ…์ฒ˜๋Š” ์•”ํ˜ธ ์ƒ์„ฑ ๋ฐ ํ…Œ์ŠคํŠธ๋ฅผ ์œ„ํ•œ ๋‚ด๋ถ€ ๋„๊ตฌ์™€ ๊ณต๊ฒฉ ๋ชจ๋“ˆ๋กœ ๊ตฌ์„ฑ๋˜์–ด ์žˆ์Šต๋‹ˆ๋‹ค. ๊ฐ ๊ตฌ์„ฑ ์š”์†Œ ๊ฐ„ ์ƒํ˜ธ ์ž‘์šฉ์€ ์ž์„ธํžˆ ์„ค๋ช…๋˜์–ด ์žˆ์œผ๋ฉฐ, ์ด๋ฅผ ํ†ตํ•ด ํ”„๋ ˆ์ž„์›Œํฌ์˜ ์ „์ฒด์ ์ธ ๊ตฌ์กฐ๋ฅผ ์ดํ•ดํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ํŒจํ‚ค์ง€ ๊ตฌ์กฐ : ์ž๋ฐ” ํŒจํ‚ค์ง€ ๊ตฌ์กฐ๋Š” ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์˜ ๋ชจ๋“ˆ

Framework Analysis Software Engineering Cryptography and Security Computer Science
No Image

The Asymptotic Mandelbrot Law of Some Evolution Networks

๋ณธ ๋…ผ๋ฌธ์€ ๋ณต์žกํ•œ ๋„คํŠธ์›Œํฌ์—์„œ ๊ด€์ฐฐ๋˜๋Š” ๋งŒ๋ธ๋ธŒ๋กœํŠธ ๋ฒ•์น™์— ๋Œ€ํ•œ ์—„๋ฐ€ํ•œ ์ˆ˜ํ•™์  ์ฆ๋ช…์„ ์ œ๊ณตํ•˜๋ฉฐ, ์ด๋ฅผ ํ†ตํ•ด ์„ ํ˜• ์„ ํ˜ธ ๋ถ€์ฐฉ ๋ชจ๋ธ์ด ์–ด๋–ป๊ฒŒ ์ด๋Ÿฌํ•œ ํŠน์„ฑ์„ ์ƒ์„ฑํ•˜๋Š”์ง€ ๊นŠ๊ฒŒ ๋ถ„์„ํ•œ๋‹ค. ๋…ผ๋ฌธ์€ ์ฃผ์š” ์„ธ ๊ฐ€์ง€ ๊ทผ์‚ฌ๋ฒ•์„ ์‚ฌ์šฉํ•˜์—ฌ ์ฐจ์ˆ˜ ๋ถ„ํฌ์˜ ๊ทนํ•œ ํ˜•ํƒœ๋ฅผ ์œ ๋„ํ•˜๊ณ , ๊ฐ ๋ฐฉ๋ฒ•์˜ ๊ฒฐ๊ณผ๋ฅผ ๋น„๊ตํ•œ๋‹ค. 1. ์—ฐ๊ตฌ ๋ฐฐ๊ฒฝ ๋ฐ ์ค‘์š”์„ฑ ๋ณต์žก ๋„คํŠธ์›Œํฌ๋Š” ๋‹ค์–‘ํ•œ ํ•™๋ฌธ ๋ถ„์•ผ์—์„œ ์ค‘์š”ํ•œ ๊ด€์‹ฌ ๋Œ€์ƒ์ด๋‹ค. ํŠนํžˆ, ์ด๋Ÿฌํ•œ ๋„คํŠธ์›Œํฌ์˜ ๊ทœ๋ชจ ์ž์œ  ํŠน์„ฑ์€ ๊ทธ ๋ณดํŽธ์„ฑ๊ณผ ์ค‘์š”์„ฑ์„ ๊ฐ•์กฐํ•˜๋ฉฐ, ์ด๋Š” ๋„คํŠธ์›Œํฌ ๋‚ด ๋…ธ๋“œ๋“ค์˜ ์ฐจ์ˆ˜ ๋ถ„ํฌ๊ฐ€ ์ „๋ ฅ๋ฒ•์น™์— ๋”ฐ๋ผ ๊ฒฐ์ •๋œ๋‹ค๋Š” ๊ฒƒ์„ ์˜๋ฏธํ•œ๋‹ค. ๋ฐ”๋ฐ”๋ผ์‹œ์™€

Computer Science Physics Social Networks Network
A Majorization Order on Monomials and Termination of a Successive   Difference Substitution Algorithm

A Majorization Order on Monomials and Termination of a Successive Difference Substitution Algorithm

๋ณธ ๋…ผ๋ฌธ์€ ์„ฑ๊ณต์ ์ธ ์ฐจ๋ถ„ ๋Œ€์ฒด ์•Œ๊ณ ๋ฆฌ์ฆ˜(KSDS)์˜ ์ข…๊ฒฐ์„ฑ์— ๋Œ€ํ•œ ์‹ฌ๋„ ์žˆ๋Š” ์—ฐ๊ตฌ๋ฅผ ์ œ๊ณตํ•˜๋ฉฐ, ํŠนํžˆ ์ฃผ์š”ํ™” ์ˆœ์„œ๋ฅผ ์ด์šฉํ•˜์—ฌ ์ด ์•Œ๊ณ ๋ฆฌ์ฆ˜์ด ์–ธ์ œ ์ข…๋ฃŒ๋˜๋Š”์ง€ ๋ถ„์„ํ•œ๋‹ค. KSDS๋Š” ๋‹คํ•ญ์‹ ํ•จ์ˆ˜์—์„œ ํŠน์ • ์กฐ๊ฑด์„ ๋งŒ์กฑํ•˜๋Š” ๊ฒฝ์šฐ ์–‘์ ์œผ๋กœ ์ข…๋ฃŒ๋˜๋ฉฐ, ์ด๋Ÿฌํ•œ ์กฐ๊ฑด์€ ์ฃผ๋กœ ๋‹จํ•ญ์‹์˜ ๊ณ„์ˆ˜์™€ ๊ทธ๋“ค์˜ ๊ด€๊ณ„์— ๊ธฐ๋ฐ˜ํ•œ๋‹ค. 1. KSDS์˜ ์ •์˜ ๋ฐ ๋ฐฐ๊ฒฝ KSDS๋Š” ์ž…๋ ฅ ํ•จ์ˆ˜ f๋ฅผ ๋‹คํ•ญ์‹ ํ˜•ํƒœ๋กœ ํ‘œํ˜„ํ•˜๊ณ , ์ด ๋‹คํ•ญ์‹์—์„œ ํŠน์ •ํ•œ ๋Œ€์ฒด ๊ทœ์น™์„ ์ ์šฉํ•˜์—ฌ ์ƒˆ๋กœ์šด ๋‹คํ•ญ์‹์„ ์ƒ์„ฑํ•˜๋Š” ์•Œ๊ณ ๋ฆฌ์ฆ˜์ด๋‹ค. ๋…ผ๋ฌธ์—์„œ๋Š” ๋‹จํ•ญ์‹์ด ์–‘์ˆ˜ ๋˜๋Š” ์Œ์ˆ˜ ๊ณ„์ˆ˜๋ฅผ ๊ฐ€์งˆ ๋•Œ์˜ ํŠน์„ฑ์„ ์ •์˜ํ•œ๋‹ค. ํŠน

Symbolic Computation Mathematics Computer Science
Matrix Inversion Using Cholesky Decomposition

Matrix Inversion Using Cholesky Decomposition

๋ณธ ๋…ผ๋ฌธ์€ ํ–‰๋ ฌ ์—ญํ–‰๋ ฌ ๊ณ„์‚ฐ์—์„œ ์ฝœ๋ ˆ์Šคํ‚ค ๋ถ„ํ•ด์™€ LDL ๋ถ„ํ•ด์˜ ํ™œ์šฉ ๋ฐฉ๋ฒ•์„ ๊ฐœ์„ ํ•˜์—ฌ ์—ฐ์‚ฐ ํšจ์œจ์„ฑ์„ ํ–ฅ์ƒ์‹œํ‚ค๋Š” ์ƒˆ๋กœ์šด ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ์ œ์‹œํ•œ๋‹ค. ์ด ์—ฐ๊ตฌ๋Š” ๊ธฐ์กด ์•Œ๊ณ ๋ฆฌ์ฆ˜์— ๋น„ํ•ด 16 17%์˜ ์—ฐ์‚ฐ ํšŸ์ˆ˜๋ฅผ ์ค„์ด๋Š” ํšจ๊ณผ๋ฅผ ๋ณด์—ฌ์ฃผ๋ฉฐ, ํŠนํžˆ ์ค‘๊ฐ„ ๊ฒฐ๊ณผ ๊ณ„์‚ฐ์„ ํ”ผํ•˜๋Š” ๋ฐฉ๋ฒ•๋ก ์ด ํ•ต์‹ฌ์ด๋‹ค. ์ฝœ๋ ˆ์Šคํ‚ค ๋ถ„ํ•ด์™€ LDL ๋ถ„ํ•ด ์ฝœ๋ ˆ์Šคํ‚ค ๋ถ„ํ•ด๋Š” ์–‘์˜ ์ค€๋Œ€์นญ ํ–‰๋ ฌ์„ ํ•˜์‚ผ๊ฐ ํ–‰๋ ฌ๊ณผ ๊ทธ ์ „์น˜ ํ–‰๋ ฌ๋กœ ๋ถ„ํ•ดํ•˜๋Š” ๊ธฐ๋ฒ•์œผ๋กœ, ์—ฐ์‚ฐ ๋ณต์žก๋„๊ฐ€ O(nยฒ) ์ด๋ฉฐ ์ˆ˜์น˜์ ์œผ๋กœ ์•ˆ์ •์ ์ด๋‹ค. ์ด ๋ฐฉ๋ฒ•์€ ์†Œํ”„ํŠธ์›จ์–ด ๊ตฌํ˜„ ์‹œ ์ƒ์‚ผ๊ฐ ํ–‰๋ ฌ์„ ์„ ํ˜ธํ•˜๋ฉฐ, C ํ”„๋กœ๊ทธ๋ž˜๋ฐ ์–ธ์–ด์™€ ํ˜ธํ™˜๋œ๋‹ค. LDL ๋ถ„

Mathematical Software Computer Science
Nordhaus-Gaddum for Treewidth

Nordhaus-Gaddum for Treewidth

: ๋ณธ ์—ฐ๊ตฌ์—์„œ๋Š” ๋…ธ๋“œ ๊ฐ€๋“œ๋‹ด ์œ ํ˜• ์ •๋ฆฌ๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ ํŠธ๋ฆฌ ๋„ˆ๋น„(treewidth)์— ๋Œ€ํ•œ ์ƒˆ๋กœ์šด ๊ด€์ ์„ ์ œ์‹œํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ์ด๋Š” ํŠนํžˆ ๊ทธ๋ž˜ํ”„ ์ด๋ก ์—์„œ ์ค‘์š”ํ•œ ๋งค๊ฐœ๋ณ€์ˆ˜๋กœ, ๊ทธ๋ž˜ํ”„์˜ ๋ณต์žก์„ฑ์„ ์ธก์ •ํ•˜๋Š” ๋ฐ ํ™œ์šฉ๋ฉ๋‹ˆ๋‹ค. ํŠธ๋ฆฌ ๋„ˆ๋น„์™€ ๊ทธ ์˜๋ฏธ: ํŠธ๋ฆฌ ๋„ˆ๋น„๋Š” ๊ทธ๋ž˜ํ”„ G๋ฅผ ๋ถ€๋ถ„ ๊ทธ๋ž˜ํ”„๋กœ ํฌํ•จํ•  ์ˆ˜ ์žˆ๋Š” k ํŠธ๋ฆฌ(k tree)์˜ ์ตœ์†Œ ์ •์ˆ˜ k๋ฅผ ๋‚˜ํƒ€๋ƒ…๋‹ˆ๋‹ค. ์ด๋Š” ํŠธ๋ฆฌ ๋ถ„ํ•ด(tree decomposition)๋ฅผ ํ†ตํ•ด ์ •์˜๋˜๋ฉฐ, ๊ทธ๋ž˜ํ”„์˜ ๋ณต์žก์„ฑ์„ ์ธก์ •ํ•˜๋Š” ๋ฐ ์ค‘์š”ํ•œ ์—ญํ• ์„ ํ•ฉ๋‹ˆ๋‹ค. ๋…ธ๋“œ ๊ฐ€๋“œ๋‹ด ์œ ํ˜• ์ •๋ฆฌ์™€ ํŠธ๋ฆฌ ๋„ˆ๋น„: ๋ณธ ๋…ผ๋ฌธ์—์„œ ์ œ์‹œ๋œ ๋…ธ๋“œ ๊ฐ€๋“œ๋‹ด

Mathematics Computer Science Discrete Mathematics
Linear-Time Poisson-Disk Patterns

Linear-Time Poisson-Disk Patterns

: ๋ณธ ๋…ผ๋ฌธ์€ ํฌ์•„์†ก ๋””์Šคํฌ ํŒจํ„ด ์ƒ์„ฑ์— ๋Œ€ํ•œ ํšจ์œจ์ ์ธ ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ์ œ์‹œํ•˜๋ฉฐ, ์ด๋Š” O(N) ์‹œ๊ฐ„ ๋ณต์žก๋„๋ฅผ ๋ณด์žฅํ•œ๋‹ค. ์ด ์—ฐ๊ตฌ์˜ ํ•ต์‹ฌ ์•„์ด๋””์–ด๋Š” ๋‘ ๊ฐ€์ง€ ๋ฐ์ดํ„ฐ ๊ตฌ์กฐ๋ฅผ ํ™œ์šฉํ•˜๋Š” ๊ฒƒ์ด๋‹ค: ์ ์ด ์ถ”๊ฐ€๋  ์ˆ˜ ์žˆ๋Š” ์˜์—ญ ๊ทธ๋ฆฌ๋“œ์™€ ์ƒˆ๋กœ์šด ์ ์ด ์ƒ์„ฑ๋  ์˜์—ญ ์ง‘ํ•ฉ (๊ทธ๋ฆฌ๋“œ์˜ ํ•˜์œ„ ์ง‘ํ•ฉ). ์ด๋Ÿฌํ•œ ์ ‘๊ทผ๋ฒ•์€ ๊ธฐ์กด ๋ฐฉ๋ฒ•๋“ค์— ๋น„ํ•ด ํ–ฅ์ƒ๋œ ํšจ์œจ์„ฑ์„ ์ œ๊ณตํ•œ๋‹ค. 1. ์•Œ๊ณ ๋ฆฌ์ฆ˜์˜ ๊ตฌ์„ฑ ์š”์†Œ ์˜์—ญ ๊ทธ๋ฆฌ๋“œ : ์ด๋Š” ์ „์ฒด ๊ณต๊ฐ„์„ ์ž‘์€ ์‚ฌ๊ฐํ˜•์œผ๋กœ ๋‚˜๋ˆ„์–ด, ๊ฐ ์˜์—ญ์—์„œ ์ตœ๋Œ€ ํ•œ ๊ฐœ์˜ ์ ๋งŒ ์ƒ์„ฑ๋  ์ˆ˜ ์žˆ๋„๋ก ํ•œ๋‹ค. ์ƒˆ๋กœ์šด ์  ์ƒ์„ฑ ์˜์—ญ ์ง‘ํ•ฉ : ์ด๋Š” ์ ์ด ์ถ”๊ฐ€๋  ๊ฐ€๋Šฅ์„ฑ์ด

Computer Science Graphics
RISC and CISC

RISC and CISC

RISC์™€ CISC๋Š” ์ปดํ“จํ„ฐ ์•„ํ‚คํ…์ฒ˜ ์„ค๊ณ„์—์„œ ๋‘ ๊ฐ€์ง€ ๊ทน๋‹จ์ ์ธ ์ ‘๊ทผ ๋ฐฉ์‹์„ ๋Œ€ํ‘œํ•˜๋ฉฐ, ๊ฐ๊ฐ์ด ํŠน์ • ์‹œ์ ์—์„œ์˜ ๊ธฐ์ˆ ์  ์š”๊ตฌ์‚ฌํ•ญ๊ณผ ์ œํ•œ ์กฐ๊ฑด์— ๋”ฐ๋ผ ๋ฐœ์ „ํ•ด์™”์Šต๋‹ˆ๋‹ค. ์ด ๋…ผ๋ฌธ์€ RISC์™€ CISC์˜ ์žฅ๋‹จ์ ์„ ๋น„๊ตํ•˜๊ณ  ํ˜„๋Œ€ ์ปดํ“จํŒ… ํ™˜๊ฒฝ์—์„œ์˜ ์ ํ•ฉ์„ฑ์„ ๋ถ„์„ํ•ฉ๋‹ˆ๋‹ค. 1. ์„ค๊ณ„ ์ฒ ํ•™์˜ ๋ฐฐ๊ฒฝ CISC ์•„ํ‚คํ…์ฒ˜๋Š” ์ดˆ๊ธฐ ์ปดํ“จํ„ฐ ์‹œ์Šคํ…œ์—์„œ ์ฃผ ๋ฉ”๋ชจ๋ฆฌ๊ฐ€ ์ œํ•œ์ ์ด์—ˆ๋˜ ์ƒํ™ฉ์—์„œ ๋ฐœ์ „ํ–ˆ์Šต๋‹ˆ๋‹ค. ์ด๋•Œ, ๋ณต์žกํ•œ ๋ช…๋ น์–ด ์ง‘ํ•ฉ์€ ํ”„๋กœ๊ทธ๋žจ ์ฝ”๋“œ๋ฅผ ๋” ์งง๊ฒŒ ๋งŒ๋“ค๊ณ  ๋ฉ”๋ชจ๋ฆฌ๋ฅผ ํšจ์œจ์ ์œผ๋กœ ์‚ฌ์šฉํ•  ์ˆ˜ ์žˆ๊ฒŒ ํ–ˆ์Šต๋‹ˆ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ์ด๋Ÿฌํ•œ ์„ค๊ณ„๋Š” ๋ช…๋ น์–ด ๊ธธ์ด ๋ณ€๋™๊ณผ ๋ณต์žกํ•œ ๋””์ฝ”๋”ฉ ๋ฌธ

Computer Science Hardware Architecture
Astro-WISE processing of wide-field images and other data

Astro-WISE processing of wide-field images and other data

Catchy Title KO: ์ฒœ๋ฌธํ•™์˜ ๋ฐ์ดํ„ฐ ์ฒ˜๋ฆฌ ํ˜์‹ , Astro WISE Abstract KO: ๋ณธ ๋…ผ๋ฌธ์€ ์œ ๋Ÿฝ ์ฒœ๋ฌธํ•™์ž๋“ค์ด ๊ฐœ๋ฐœํ•œ ๋Œ€๊ทœ๋ชจ ์ฒœ๋ฌธ ๊ด€์ธก ๋ฐ์ดํ„ฐ๋ฅผ ํšจ์œจ์ ์œผ๋กœ ์ฒ˜๋ฆฌํ•˜๊ธฐ ์œ„ํ•œ ๊ณผํ•™ ์ •๋ณด ์‹œ์Šคํ…œ์ธ Astro WISE ์— ๋Œ€ํ•ด ์†Œ๊ฐœํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. Astro WISE๋Š” ๋‹ค์–‘ํ•œ ์ฒœ๋ฌธ ๊ธฐ๊ธฐ๋กœ๋ถ€ํ„ฐ ์ƒ์„ฑ๋˜๋Š” ๋ฐฉ๋Œ€ํ•œ ์–‘์˜ ๋ฐ์ดํ„ฐ๋ฅผ ํšจ๊ณผ์ ์œผ๋กœ ๊ด€๋ฆฌํ•˜๊ณ  ๋ถ„์„ํ•  ์ˆ˜ ์žˆ๋„๋ก ์„ค๊ณ„๋˜์—ˆ์Šต๋‹ˆ๋‹ค. ์ด ์‹œ์Šคํ…œ์€ ๊ฐ์ฒด ์ง€ํ–ฅ ๋ฐ์ดํ„ฐ ๋ชจ๋ธ์„ ๊ธฐ๋ฐ˜์œผ๋กœ ํ•˜๋ฉฐ, ์‚ฌ์šฉ์ž๋Š” ํŒŒ์ดํ”„๋ผ์ธ์—์„œ ๋ ˆ์‹œํ”ผ(์ฒ˜๋ฆฌ ๋‹จ๊ณ„)๋ฅผ ์กฐํ•ฉํ•˜์—ฌ ์›ํ•˜๋Š” ์ตœ์ข… ๋ฐ์ดํ„ฐ ์ œํ’ˆ์„ ์–ป์„ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค

Digital Libraries Data Computer Science Astrophysics
Promoting scientific thinking with robots

Promoting scientific thinking with robots

: ์ด ๋…ผ๋ฌธ์€ ๋กœ๋ด‡์„ ํ™œ์šฉํ•˜์—ฌ ํ•™์ƒ๋“ค์˜ ๊ณผํ•™์  ์‚ฌ๊ณ  ๋Šฅ๋ ฅ์„ ํ–ฅ์ƒ์‹œํ‚ค๋Š” ๋ฐฉ๋ฒ•์— ๋Œ€ํ•ด ๊นŠ์ด ์žˆ๊ฒŒ ๋ถ„์„ํ•˜๊ณ  ์žˆ๋‹ค. ์ฃผ์š” ๋‚ด์šฉ๊ณผ ๊ทธ ์ค‘์š”์„ฑ์„ ์‚ดํŽด๋ณด์ž. 1. ๋กœ๋ด‡์˜ ์„ค๊ณ„์™€ ๊ตฌ์กฐ ๊ตฌ์„ฑ ์š”์†Œ : ์ด ๋กœ๋ด‡์€ DC ๋ชจํ„ฐ, ๊ด‘ ์„ผ์„œ, Arduino ์ œ์–ด ๋ณด๋“œ ๋“ฑ์œผ๋กœ ๊ตฌ์„ฑ๋˜์–ด ์žˆ๋‹ค. ์ž‘๋™ ์›๋ฆฌ : ๊ด‘ ์„ผ์„œ๋Š” ๋น›์„ ๊ฐ์ง€ํ•˜๊ณ  ์ด๋ฅผ ํ†ตํ•ด ๋ชจํ„ฐ์˜ ์†๋„๋ฅผ ์กฐ์ ˆํ•œ๋‹ค. ์„ผ์„œ๊ฐ€ ๊ฐ์ง€ํ•œ ๋น›์˜ ๊ฐ•๋„์— ๋”ฐ๋ผ ๋ชจํ„ฐ์˜ ํšŒ์ „ ์†๋„๊ฐ€ ๋ณ€ํ•˜๋ฉฐ, ์ด๋กœ ์ธํ•ด ๋กœ๋ด‡์€ ๋น›์„ ์ถ”์ ํ•˜๋Š” ํ–‰๋™์„ ๋ณด์ธ๋‹ค. ํ”„๋กœ๊ทธ๋ž˜๋ฐ : Arduino ํ”„๋กœ๊ทธ๋žจ์„ ํ†ตํ•ด ์ œ์–ด๋˜๋ฉฐ, ์ด๋ฅผ ํ†ตํ•ด ๋‹ค์–‘ํ•œ ์‹คํ—˜๊ณผ ๊ฐ€์„ค

Robotics Physics Computer Science Artificial Intelligence
A well-balanced finite volume scheme for 1D hemodynamic simulations

A well-balanced finite volume scheme for 1D hemodynamic simulations

๋ณธ ๋…ผ๋ฌธ์€ ํ˜ˆ๋ฅ˜ ํ๋ฆ„์˜ 1์ฐจ์› ๋ชจ๋ธ ๋ฐ ์ˆ˜์น˜ ์‹œ๋ฎฌ๋ ˆ์ด์…˜์— ์ดˆ์ ์„ ๋งž์ถ”๊ณ  ์žˆ๋‹ค. ํŠนํžˆ, ๋น„์ผ์ • ํƒ„์„ฑ์„ฑ์„ ๊ฐ€์ง„ ๋™๋งฅ์—์„œ์˜ ํ˜ˆ๋ฅ˜๋ฅผ ์ •ํ™•ํ•˜๊ฒŒ ๋ชจ๋ธ๋งํ•˜๊ณ  ์‹œ๋ฎฌ๋ ˆ์ด์…˜ํ•˜๊ธฐ ์œ„ํ•œ ๊ท ํ˜• ์žกํžŒ ์œ ํ•œ ์ฒด์  ์Šคํ‚ด์„ ์ œ์•ˆํ•œ๋‹ค. 1. ๋ณด์กดํ˜• ์งˆ๋Ÿ‰ ๋ฐ ์šด๋™๋Ÿ‰ ๋ฐฉ์ •์‹ ๋…ผ๋ฌธ์€ ๋น„์ผ์ • ํƒ„์„ฑ์„ฑ์„ ๊ฐ€์ง„ ๋™๋งฅ์—์„œ์˜ ํ˜ˆ๋ฅ˜ ํ๋ฆ„์„ ๋ชจ๋ธ๋งํ•˜๊ธฐ ์œ„ํ•ด ๋ณด์กดํ˜• ์งˆ๋Ÿ‰ ๋ฐ ์šด๋™๋Ÿ‰ ๋ฐฉ์ •์‹์„ ๊ณ ๋ คํ•˜๊ณ  ์žˆ๋‹ค. ์ด ๋ฐฉ์ •์‹๋“ค์€ ์ผ๋ฐ˜์ ์œผ๋กœ ์‚ฌ์šฉ๋˜๋Š” ํ˜•ํƒœ์™€ ๋‹ฌ๋ฆฌ ๋ณด์ˆ˜์ ์ธ ํ˜•ํƒœ๋กœ ์žฌํ‘œํ˜„๋˜์–ด ์žˆ์œผ๋ฉฐ, ์ด๋ฅผ ํ†ตํ•ด ์ •์  ์ƒํƒœ๋ฅผ ๋ณด์กดํ•˜๋Š” ๊ท ํ˜• ์žกํžŒ ์Šคํ‚ด์„ ๋„์ž…ํ•  ์ˆ˜ ์žˆ๊ฒŒ ๋œ๋‹ค. 2. ๊ท ํ˜• ์žกํžŒ ์œ ํ•œ ์ฒด์ 

Mathematics Numerical Analysis Computer Science
No Image

Note on fast division algorithm for polynomials using Newton iteration

: ์„œ๋ก  ๋…ผ๋ฌธ์€ ๋‹คํ•ญ์‹์ด ํ•„๋“œ ์œ„์—์„œ ์œ ํด๋ฆฌ๋“œ ์˜์—ญ์„ ํ˜•์„ฑํ•˜๋ฉฐ, ์ด๋Š” ๋ชจ๋“  a์™€ b์— ๋Œ€ํ•ด (b๊ฐ€ 0์ด ์•„๋‹Œ ๊ฒฝ์šฐ) ๊ณ ์œ ํ•œ q์™€ r์ด ์กด์žฌํ•˜์—ฌ a qb + r์ด๊ณ  r์˜ ์ฐจ์ˆ˜๊ฐ€ b๋ณด๋‹ค ์ž‘๋‹ค๋Š” ๊ฒƒ์„ ์„ค๋ช…ํ•œ๋‹ค. ์ „ํ†ต์ ์ธ ๋‹คํ•ญ์‹ ๋‚˜๋ˆ—์…ˆ ์•Œ๊ณ ๋ฆฌ์ฆ˜์€ O(n^2) ์—ฐ์‚ฐ์„ ํ•„์š”๋กœ ํ•˜์ง€๋งŒ, ๋‰ดํ„ด ๋ฐ˜๋ณต๊ณผ ๋ฐ˜์ „ ๊ธฐ๋ฒ•์„ ์‚ฌ์šฉํ•˜๋ฉด ์ด๋ฅผ M(n)์œผ๋กœ ๊ฐœ์„ ํ•  ์ˆ˜ ์žˆ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ์ด ๋ฐฉ๋ฒ•์€ xl์˜ ์ฐจ์ˆ˜๊ฐ€ 2์˜ ๊ฑฐ๋“ญ์ œ๊ณฑ์ผ ๊ฒƒ์„ ์š”๊ตฌํ•œ๋‹ค. ๋‹คํ•ญ์‹ ๋‚˜๋ˆ—์…ˆ ์•Œ๊ณ ๋ฆฌ์ฆ˜ ๋…ผ๋ฌธ์—์„œ๋Š” ๋‹คํ•ญ์‹ a์™€ b์— ๋Œ€ํ•ด q์™€ r์„ ์ฐพ๋Š” ๋ฌธ์ œ๋ฅผ ๋‹ค๋ฃฌ๋‹ค. ์ด๋ฅผ ์œ„ํ•ด a qb + r ํ˜•ํƒœ๋กœ ํ‘œํ˜„

Computer Science Symbolic Computation
No Image

Deriving a Hoare-Floyd logic for non-local jumps from a formulae-as-types notion of control

: ์ด ๋…ผ๋ฌธ์€ ๋น„๋กœ์ปฌ ์ ํ”„์™€ ๋ณ€์ˆ˜์„ฑ ๋†’์€ ์ƒ์œ„ ์ˆœ์ฐจ์  ์ ˆ์ฐจ ๋ณ€์ˆ˜๋ฅผ ๋‹ค๋ฃจ๋Š” ํ˜ธ์–ด ํ”Œ๋ ˆ์ด๋“œ(Hoare Floyd) ๋…ผ๋ฆฌ์˜ ์ƒˆ๋กœ์šด ์ ‘๊ทผ๋ฒ•์„ ์ œ์‹œํ•œ๋‹ค. ์ด ์—ฐ๊ตฌ๋Š” ๊ณ ์ „ ๋…ผ๋ฆฌ์˜ ๊ณต์‹ ์œ ํ˜•(formulas as types) ๊ฐœ๋…์—์„œ ์ถœ๋ฐœํ•˜์—ฌ, ๋ช…๋ นํ˜• ํ”„๋กœ๊ทธ๋žจ์— ์ ์šฉํ•  ์ˆ˜ ์žˆ๋Š” ์˜์กด ์œ ํ˜• ์‹œ์Šคํ…œ(ID: Imperative Dependent Types)๋ฅผ ์„ค๊ณ„ํ•˜๊ณ  ์ด๋ฅผ ํ†ตํ•ด ๋น„๋กœ์ปฌ ์ ํ”„์™€ ๋ณ€์ˆ˜์„ฑ ๋†’์€ ์ ˆ์ฐจ ๋ณ€์ˆ˜๋ฅผ ๋‹ค๋ฃจ๋Š” ํ˜ธ์–ด ํ”Œ๋ ˆ์ด๋“œ ๋…ผ๋ฆฌ๋ฅผ ๊ตฌํ˜„ํ•œ๋‹ค. ๋ฐฐ๊ฒฝ ๋ฐ ๋ฌธ์ œ์˜์‹ ํ˜ธ์–ด ํ”Œ๋ ˆ์ด๋“œ ๋…ผ๋ฆฌ๋Š” ํ”„๋กœ๊ทธ๋žจ ์ •ํ™•์„ฑ์„ ์ฆ๋ช…ํ•˜๋Š” ๋ฐ ๋„๋ฆฌ ์‚ฌ์šฉ๋˜์ง€๋งŒ, ๋น„๋กœ์ปฌ

Logic Computer Science
Gas turbine diagnostic system

Gas turbine diagnostic system

๋ณธ ๋…ผ๋ฌธ์€ ๊ฐ€์Šค ํ„ฐ๋นˆ ์ง„๋‹จ ์‹œ์Šคํ…œ์˜ ๊ฐœ๋ฐœ ๋ฐ ์‘์šฉ์— ๋Œ€ํ•ด ์ƒ์„ธํžˆ ๋‹ค๋ฃจ๊ณ  ์žˆ๋‹ค. ์ด ์—ฐ๊ตฌ๋Š” ๊ฐ€์Šค ํ„ฐ๋นˆ์˜ ์ž๋™ํ™” ์‹œ์Šคํ…œ ์†Œํ”„ํŠธ์›จ์–ด๋ฅผ ํ…Œ์ŠคํŠธํ•˜๊ณ  ์ตœ์ ํ™”ํ•˜๋Š” ๋ฐ ์‚ฌ์šฉ๋˜๋Š” ๋ชจํ˜•์„ ์ œ์‹œํ•˜๋ฉฐ, ์ด๋ฅผ ํ†ตํ•ด ์šด์˜์ž์™€ ์—”์ง€๋‹ˆ์–ด์—๊ฒŒ ๊ต์œก ๋„๊ตฌ๋กœ ํ™œ์šฉํ•  ์ˆ˜ ์žˆ๋Š” ๋ฐฉ๋ฒ•์„ ์ œ์•ˆํ•œ๋‹ค. ๋˜ํ•œ, ๊ฐ€์Šค ํ„ฐ๋นˆ์˜ ํšจ์œจ์„ฑ์„ ๋ถ„์„ํ•˜๊ณ  ์˜ˆ์ธกํ•˜๋Š” ์ง„๋‹จ ๋ฐ ์˜ˆ์ธก ์ž‘์—…์—๋„ ์œ ์šฉํ•˜๋‹ค๋Š” ์ ์„ ๊ฐ•์กฐํ•˜๊ณ  ์žˆ๋‹ค. 1. ์‹œ๋ฎฌ๋ ˆ์ด์…˜ ์‹œ์Šคํ…œ ๊ฐœ์š” ๋ณธ ๋…ผ๋ฌธ์—์„œ ๊ฐœ๋ฐœ๋œ ์‹œ๋ฎฌ๋ ˆ์ด์…˜ ์‹œ์Šคํ…œ์€ ๊ฐ€์Šค ํ„ฐ๋นˆ ๋‹จ์œ„์˜ ์ž‘๋™๊ณผ ์ œ์–ด๋ฅผ ์‹œ๋ฎฌ๋ ˆ์ด์…˜ํ•˜๋Š” ๋ฐ ์ดˆ์ ์„ ๋งž์ถ”๊ณ  ์žˆ๋‹ค. ์ด๋Š” GTCU(Gas Turbine

Other CS Computer Science System
No Image

Stabilizer States as a Basis for Density Matrices

๋ณธ ๋…ผ๋ฌธ์€ ์–‘์ž ์ •๋ณด ์ฒ˜๋ฆฌ ๋ถ„์•ผ์—์„œ ์ค‘์š”ํ•œ ๊ฐœ๋…์ธ ์•ˆ์ •ํ™” ์ƒํƒœ์™€ ๋ฐ€๋„ ํ–‰๋ ฌ์˜ ๊ด€๊ณ„๋ฅผ ํƒ๊ตฌํ•˜๊ณ , ์ด๋ฅผ ํ†ตํ•ด ์–‘์ž ์‹œ์Šคํ…œ์˜ ๋ชจ๋ธ ๊ฒ€์ฆ์„ ํšจ์œจ์ ์œผ๋กœ ์ˆ˜ํ–‰ํ•˜๋Š” ๋ฐฉ๋ฒ•์„ ์ œ์‹œํ•ฉ๋‹ˆ๋‹ค. ์ด ์—ฐ๊ตฌ๋Š” ์–‘์ž ์ปดํ“จํŒ…๊ณผ ๊ด€๋ จ๋œ ์—ฌ๋Ÿฌ ๋ฌธ์ œ ํ•ด๊ฒฐ์— ์žˆ์–ด ์ค‘์š”ํ•œ ๊ธฐ์—ฌ๋ฅผ ํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. 1. ์•ˆ์ •ํ™” ์ƒํƒœ์™€ ๋ฐ€๋„ ํ–‰๋ ฌ ์•ˆ์ •ํ™” ์ƒํƒœ๋Š” ํŠน์ • ํŒŒ์šธ๋ฆฌ ์—ฐ์‚ฐ์ž์˜ ์ƒ์„ฑ์ž์™€ ์•ˆ์ •ํ™” ๊ทธ๋ฃน์˜ ๊ต์ง‘ํ•ฉ์œผ๋กœ ํ‘œํ˜„๋˜๋Š” ์–‘์ž ์ƒํƒœ์ž…๋‹ˆ๋‹ค. ์ด๋Ÿฌํ•œ ์ƒํƒœ๋“ค์€ ํ—ค๋“œ๋งˆ๋ฅด, ํŒŒ์šธ๋ฆฌ, ์ œ์–ด NOT, ๊ทธ๋ฆฌ๊ณ  ์œ„์ƒ ๊ฒŒ์ดํŠธ์— ๋Œ€ํ•ด ๋‹ซํ˜€ ์žˆ์œผ๋ฉฐ, ์ด๋“ค ๊ฐ„์˜ ํ…์„œ ๊ณฑ๋„ ์—ญ์‹œ ์•ˆ์ •ํ™” ์ƒํƒœ๋ฅผ ํ˜•์„ฑํ•ฉ๋‹ˆ๋‹ค. ๋…ผ๋ฌธ์—์„œ

Computer Science Emerging Technologies Quantum Physics
Coron : Plate-forme dextraction de connaissances dans les bases de   donnees

Coron : Plate-forme dextraction de connaissances dans les bases de donnees

์ฝ”๋กœ๋‚˜(CORON)๋Š” ์›๋ž˜ ์ฝ”ํ˜ธํŠธ ์—ฐ๊ตฌ๋ฅผ ์œ„ํ•œ ๋„๊ตฌ๋กœ ๊ฐœ๋ฐœ๋˜์—ˆ์ง€๋งŒ, ํ˜„์žฌ๋Š” ๋…๋ฆฝ์ ์ธ ๋ฐ์ดํ„ฐ ๋งˆ์ด๋‹ ํ”Œ๋žซํผ์œผ๋กœ ์ง„ํ™”ํ–ˆ์Šต๋‹ˆ๋‹ค. ์ด ํ”Œ๋žซํผ์€ ๋‹ค์–‘ํ•œ ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ํ†ตํ•ฉํ•˜์—ฌ ๋นˆ๋„๊ฐ€ ๋†’๊ฑฐ๋‚˜ ๋“œ๋ฌธ ํŒจํ„ด์„ ์ถ”์ถœํ•˜๊ณ  ์—ฐ๊ด€ ๊ทœ์น™์„ ์ƒ์„ฑํ•˜๋Š” ๊ธฐ๋Šฅ์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. 1. ์ฝ”๋กœ๋‚˜์˜ ๊ตฌ์„ฑ ์š”์†Œ ์ฝ”๋กœ๋‚˜๋Š” ๋ฐ์ดํ„ฐ ์ค€๋น„, ๋งˆ์ด๋‹, ํ•„ํ„ฐ๋ง ๋ฐ ํ•ด์„์„ ์œ„ํ•œ ์—ฌ๋Ÿฌ ๋ชจ๋“ˆ๋กœ ๊ตฌ์„ฑ๋ฉ๋‹ˆ๋‹ค. ์‚ฌ์ „ ์ฒ˜๋ฆฌ ๋ชจ๋“ˆ: ์ด ๋ชจ๋“ˆ์€ ๋ฐ์ดํ„ฐ๋ฅผ ๋ฐ”์ด๋„ˆ๋ฆฌ ํ…Œ์ด๋ธ” ํ˜•ํƒœ๋กœ ๋ณ€ํ™˜ํ•˜๊ณ  ๋””ํฌ๋ ˆํ‹ฐ์ œ์ด์…˜(์—ฐ์†์ ์ธ ๊ฐ’์„ ๋ฒ”์ฃผํ˜• ๊ฐ’์œผ๋กœ ๋ณ€ํ™˜ํ•˜๋Š” ๊ณผ์ •)์„ ์ˆ˜ํ–‰ํ•ฉ๋‹ˆ๋‹ค. ๋˜ํ•œ ํŒŒ์ผ ํฌ๋งท ๋ณ€ํ™˜, ๋ณด์™„ ๋ฐ ์ „์น˜ ํ…Œ์ด๋ธ” ์ƒ์„ฑ

Databases Computer Science
The Coron System

The Coron System

: 1. ์‹œ์Šคํ…œ ๊ฐœ์š” ์ฝ”๋กœ๋‚˜(Coron) ์‹œ์Šคํ…œ์€ ํŠน์ • ์—ฐ๊ตฌ ํ•„์š”์„ฑ์— ๋งž์ถฐ ๊ฐœ๋ฐœ๋˜์—ˆ์œผ๋ฉฐ, ํ˜„์žฌ๋Š” ์—ฌ๋Ÿฌ ์‘์šฉ ๋ถ„์•ผ์—์„œ ์‚ฌ์šฉ๋˜๋Š” ๋…๋ฆฝ์ ์ธ ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค ๊ธฐ๋ฐ˜ ์ง€์‹ ๋ฐœ๊ฒฌ ํ”„๋ ˆ์ž„์›Œํฌ๊ฐ€ ๋˜์—ˆ์Šต๋‹ˆ๋‹ค. ์ฝ”๋กœ๋‚˜๋Š” ๊ต์œก ๋ฐ ๊ณผํ•™์  ์šฉ๋„๋ฅผ ์œ„ํ•ด ์ค€๋น„ ๋ฐ ๋งˆ์ด๋‹ ๋ชจ๋“ˆ๋กœ ๊ตฌ์„ฑ๋˜์–ด ์ด์ง„ ๋ฐ์ดํ„ฐ๋ฅผ ์ฒ˜๋ฆฌํ•˜๊ณ  ํ•„ํ„ฐ๋งํ•˜๋ฉฐ ์ถ”์ถœ๋œ ๋‹จ์œ„๋ฅผ ํ•ด์„ํ•ฉ๋‹ˆ๋‹ค. ์ฝ”๋กœ๋‚˜ ์‹œ์Šคํ…œ์€ ๋‹ค์–‘ํ•œ ๊ณ ์ „ ์•Œ๊ณ ๋ฆฌ์ฆ˜๋ฟ๋งŒ ์•„๋‹ˆ๋ผ, ์ž์ฒด์ ์œผ๋กœ ๊ฐœ๋ฐœ๋œ ํŠนํ™”๋œ ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ํฌํ•จํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ์ฃผ์š” ์–ธ์–ด๋Š” ์ž๋ฐ”์ด๋ฉฐ, Unix, Mac, Windows ์šด์˜ ์ฒด์ œ์™€ ํ˜ธํ™˜๋˜๋ฉฐ ๋ช…๋ น์ค„ ์ธํ„ฐํŽ˜์ด์Šค๋ฅผ ์‚ฌ์šฉํ•ฉ๋‹ˆ๋‹ค. 2

Databases Computer Science System
No Image

Parameterized Eulerian Strong Component Arc Deletion Problem on Tournaments

: ์ด ๋…ผ๋ฌธ์€ ๊ทธ๋ž˜ํ”„ ์ด๋ก ์—์„œ ์ค‘์š”ํ•œ ๊ฐœ๋…์ธ ๊ฐ•ํ•˜๊ฒŒ ์—ฐ๊ฒฐ๋œ ๊ทธ๋ž˜ํ”„์™€ ์—์šธ๋Ÿฌ ๊ทธ๋ž˜ํ”„๋ฅผ ๋ฐ”ํƒ•์œผ๋กœ, ํ† ๋„ˆ๋จผํŠธ ๊ทธ๋ž˜ํ”„์—์„œ์˜ Min DESC ๋ฌธ์ œ์— ๋Œ€ํ•ด ๊นŠ๊ฒŒ ๋ถ„์„ํ•œ๋‹ค. Min DESC ๋ฌธ์ œ๋Š” ์ฃผ์–ด์ง„ ์œ ํ–ฅ ๊ทธ๋ž˜ํ”„ D ์—์„œ ์ตœ์†Œ ๊ฐ„์„  ์ง‘ํ•ฉ์„ ์ œ๊ฑฐํ•˜์—ฌ ๋ชจ๋“  ๊ฐ•ํ•œ ์„ฑ๋ถ„์ด ์—์šธ๋Ÿฌ ๊ทธ๋ž˜ํ”„๊ฐ€ ๋˜๋„๋ก ํ•˜๋Š” ๋ฌธ์ œ์ด๋‹ค. 1. ๊ฐœ๋… ์ •์˜์™€ ๋ฐฐ๊ฒฝ ๋…ผ๋ฌธ์€ ๋จผ์ € ๊ฐ•ํ•˜๊ฒŒ ์—ฐ๊ฒฐ๋œ ๊ทธ๋ž˜ํ”„์™€ ์—์šธ๋Ÿฌ ๊ทธ๋ž˜ํ”„์— ๋Œ€ํ•œ ๊ธฐ๋ณธ์ ์ธ ์ •์˜๋ฅผ ์†Œ๊ฐœํ•œ๋‹ค. ํŠนํžˆ, ๊ฐ•ํ•œ ์„ฑ๋ถ„๊ณผ DESC ์„ธํŠธ์˜ ์ •์˜๋ฅผ ํ†ตํ•ด Min DESC ๋ฌธ์ œ๋ฅผ ๋ช…ํ™•ํžˆ ํ•œ๋‹ค. ์ด๋Š” D ์—์„œ ๊ฐ„์„  ์ง‘ํ•ฉ์„ ์ œ๊ฑฐํ•˜์—ฌ ๋ชจ๋“  ๊ฐ•ํ•œ

Computer Science Data Structures Computational Complexity
A self-portrait of young Leonardo

A self-portrait of young Leonardo

: ๋ณธ ๋…ผ๋ฌธ์€ ๋ ˆ์˜ค๋‚˜๋ฅด๋„ ๋‹ค๋นˆ์น˜์˜ ์ž‘ํ’ˆ ์ค‘ ํ•˜๋‚˜์ธ ์ ์ƒ‰ ์—ฐํ•„ ์žํ™”์ƒ ์™ธ์—๋„, ๊ทธ์˜ ๋…ธํŠธ๋ถ์— ์ˆจ๊ฒจ์ง„ ๋‹ค๋ฅธ ์žํ™”์ƒ์„ ์ฐพ์•„๋‚ด๋Š” ๊ณผ์ •์„ ์†Œ๊ฐœํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ํŠนํžˆ, ์ด ์—ฐ๊ตฌ์—์„œ๋Š” ์ด๋ฏธ์ง€ ์ฒ˜๋ฆฌ ๊ธฐ์ˆ ์„ ํ™œ์šฉํ•˜์—ฌ ํ•„๊ธฐ๋ฌผ๋กœ ๊ฐ€๋ ค์ ธ ์žˆ๋˜ ์Šค์ผ€์น˜๋ฅผ ๋ณต์›ํ•˜๋Š” ๋ฐฉ๋ฒ•์„ ์ œ์‹œํ•ฉ๋‹ˆ๋‹ค. ๋ ˆ์˜ค๋‚˜๋ฅด๋„ ๋‹ค๋นˆ์น˜์˜ ์ž‘ํ’ˆ์€ ๊ทธ์˜ ์ฒœ์žฌ์„ฑ๊ณผ ์˜ˆ์ˆ ์  ๋Šฅ๋ ฅ์„ ๋ณด์—ฌ์ฃผ๋Š” ์ค‘์š”ํ•œ ์ž๋ฃŒ์ž…๋‹ˆ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ์ผ๋ถ€ ์ž‘ํ’ˆ๋“ค์€ ์‹œ๊ฐ„์ด ์ง€๋‚จ์— ๋”ฐ๋ผ ์†์ƒ๋˜๊ฑฐ๋‚˜, ํ•„๊ธฐ๋ฌผ๋กœ ์ธํ•ด ์›๋ž˜์˜ ์ด๋ฏธ์ง€๊ฐ€ ๊ฐ€๋ ค์ ธ ์žˆ๋Š” ๊ฒฝ์šฐ๊ฐ€ ๋งŽ์Šต๋‹ˆ๋‹ค. ์ด๋Ÿฌํ•œ ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•ด ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” ๋””์ง€ํ„ธ ๋ณต์› ๊ธฐ์ˆ ์„ ํ™œ์šฉํ•˜์—ฌ ์ˆจ๊ฒจ์ง„ ์ž

Computer Science Computer Vision
New Zealand involvement in Radio Astronomical VLBI Image Processing

New Zealand involvement in Radio Astronomical VLBI Image Processing

: ๋ณธ ๋…ผ๋ฌธ์€ ๋‰ด์งˆ๋žœ๋“œ์˜ ์›Œํฌ์›Œ์Šค ๋ผ๋””์˜ค ์ฒœ๋ฌธ๋Œ€(WRAO)์™€ ํ˜ธ์ฃผ ์žฅ๊ฑฐ๋ฆฌ ๋ฐฐ์—ด(LBA) ๊ฐ„์˜ ํ˜‘๋ ฅ์ด ์–ด๋–ป๊ฒŒ ๊ณ ํ•ด์ƒ๋„ ๋ผ๋””์˜ค ์˜์ƒ์„ ์ƒ์„ฑํ•˜๋Š” ๋ฐ ๊ธฐ์—ฌํ•˜๊ณ  ์žˆ๋Š”์ง€๋ฅผ ์‹ฌ์ธต์ ์œผ๋กœ ๋ถ„์„ํ•ฉ๋‹ˆ๋‹ค. WRAO๋Š” AUT ๋Œ€ํ•™๊ต์˜ IRASR์—์„œ ์šด์˜๋˜๋ฉฐ, 12m ๋ผ๋””์˜ค ๋ง์›๊ฒฝ์€ ์„ธ ๊ฐ€์ง€ ์ฃผํŒŒ์ˆ˜ ๋Œ€์—ญ(1.4, 2.3, 8.6 GHz)์—์„œ ์ž‘๋™ํ•ฉ๋‹ˆ๋‹ค. ํ•ต์‹ฌ ๋‚ด์šฉ ๋ถ„์„ VLBI์™€ LBA์˜ ํ˜‘๋ ฅ: WRAO๋Š” 2011๋…„๋ถ€ํ„ฐ LBA์— ์ •๊ธฐ์ ์œผ๋กœ ์ฐธ์—ฌํ•˜๊ณ  ์žˆ์œผ๋ฉฐ, ์ด๋กœ ์ธํ•ด VLBI ์ž‘์—…์˜ ํ•ด์ƒ๋„๊ฐ€ ํฌ๊ฒŒ ํ–ฅ์ƒ๋˜์—ˆ์Šต๋‹ˆ๋‹ค. ํŠนํžˆ WRAO์˜ ์ถ”๊ฐ€๋กœ ๋™์„œ ๊ธฐ์„  ๊ธธ์ด๊ฐ€ ์•ฝ

Graphics Computer Science Astrophysics
ABHIVYAKTI: A Vision Based Intelligent System for Elder and Sick Persons

ABHIVYAKTI: A Vision Based Intelligent System for Elder and Sick Persons

ABHIVYA KTI๋Š” ๋งํ•˜๊ฑฐ๋‚˜ ๊ฑธ์„ ์ˆ˜ ์—†๋Š” ๋…ธ์ธ์ด๋‚˜ ํ™˜์ž๋ฅผ ์œ„ํ•œ ์† ์ œ์Šค์ฒ˜ ์ธ์‹ ์‹œ์Šคํ…œ์œผ๋กœ, ์ปดํ“จํ„ฐ ๋น„์ „ ๊ธฐ์ˆ ์„ ํ™œ์šฉํ•˜์—ฌ ์‚ฌ์šฉ์ž์˜ ์ œ์Šค์ฒ˜๋ฅผ ํ•ด์„ํ•˜๊ณ  ํ•„์š”ํ•œ ๋™์ž‘์„ ์ˆ˜ํ–‰ํ•˜๋Š” ๋ฐ ์ดˆ์ ์„ ๋งž์ถ”๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ์ด ์—ฐ๊ตฌ์˜ ํ•ต์‹ฌ์€ ์ธ๊ฐ„๊ณผ ๊ธฐ๊ณ„ ๊ฐ„์˜ ์ƒํ˜ธ์ž‘์šฉ์„ ํ–ฅ์ƒ์‹œํ‚ค๋Š” ๊ฒƒ์ž…๋‹ˆ๋‹ค. 1. ์‹œ์Šคํ…œ ๊ตฌ์„ฑ ๋ฐ ์ž‘๋™ ๋ฐฉ์‹ ABHIVYA KTI๋Š” ์นด๋ฉ”๋ผ๋ฅผ ํ†ตํ•ด ์‚ฌ์šฉ์ž์˜ ์† ์ œ์Šค์ฒ˜๋ฅผ ์บก์ฒ˜ํ•˜๊ณ , ์ด๋ฅผ ํ•ด์„ํ•˜์—ฌ ํ•„์š”ํ•œ ๋™์ž‘์„ ์ˆ˜ํ–‰ํ•ฉ๋‹ˆ๋‹ค. ์ด ์‹œ์Šคํ…œ์€ ๋ฏธ๋ฆฌ ์ •์˜๋œ ์ œ์Šค์ฒ˜ ๋ฌธ๋ฒ•์— ๋”ฐ๋ผ ์ž‘๋™ํ•˜๋ฉฐ, ์œ ํšจํ•œ ์ œ์Šค์ฒ˜๊ฐ€ ์ž…๋ ฅ๋˜๋ฉด ํ•ด๋‹น ๋™์ž‘์„ ์‹คํ–‰ํ•˜๊ณ  ์™„๋ฃŒ ๋ฉ”์‹œ์ง€๋ฅผ ์‚ฌ์šฉ์ž

Computer Science System Computer Vision
Verifying Sierpinski and Riesel Numbers in ACL2

Verifying Sierpinski and Riesel Numbers in ACL2

์ด ๋…ผ๋ฌธ์€ ์‹œ๋ฅดํ”ผ๋‹ˆ(Sierpiล„ski) ์ˆ˜์™€ ๋ ˆ์ ค(Riesel) ์ˆ˜์— ๋Œ€ํ•œ ์‹ฌ๋„ ์žˆ๋Š” ๋ถ„์„๊ณผ ACL2๋ผ๋Š” ์ปดํ“จํ„ฐ ์ฆ๋ช… ๋„๊ตฌ๋ฅผ ํ™œ์šฉํ•œ ๊ทธ๋“ค์˜ ์„ฑ์งˆ ๊ฒ€์ฆ ๋ฐฉ๋ฒ•์„ ๋‹ค๋ฃน๋‹ˆ๋‹ค. ์ด๋“ค ์ˆ˜๋Š” ํŠน์ • ์–‘์˜ ํ™€์ˆ˜ ์ •์ˆ˜๊ฐ€ ๋ฌดํ•œ ๋ฆฌ์ŠคํŠธ์—์„œ ์†Œ์ˆ˜๊ฐ€ ๋ฐœ๊ฒฌ๋˜์ง€ ์•Š๋Š” ๊ฒฝ์šฐ์— ํ•ด๋‹นํ•˜๋ฉฐ, ์ด๋ฅผ ํ†ตํ•ด ์ˆ˜ํ•™์ ์œผ๋กœ ์ค‘์š”ํ•œ ์œ„์น˜๋ฅผ ์ฐจ์ง€ํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ์‹œ๋ฅดํ”ผ๋‹ˆ์™€ ๋ ˆ์ ค ์ˆ˜์˜ ๊ฐœ๋… ์‹œ๋ฅดํ”ผ๋‹ˆ ์ˆ˜์™€ ๋ ˆ์ ค ์ˆ˜๋Š” ๊ฐ๊ฐ k โ€ข 2^n + 1๊ณผ k โ€ข 2^n 1 ํ˜•ํƒœ์˜ ๋ฌดํ•œ ๋ฆฌ์ŠคํŠธ์—์„œ ์†Œ์ˆ˜๊ฐ€ ๋ฐœ๊ฒฌ๋˜์ง€ ์•Š๋Š” ์–‘์˜ ํ™€์ˆ˜ ์ •์ˆ˜์ž…๋‹ˆ๋‹ค. ์ด๋“ค ์ˆ˜๋ฅผ ์‹๋ณ„ํ•˜๋Š” ๊ฒƒ์€ ์–ด๋ ต์ง€๋งŒ, ํŠน์ • ์กฐ๊ฑด์„ ๋งŒ์กฑํ•˜๋ฉด

Computer Science Discrete Mathematics Logic
Restricted Parameter Range Promise Set Cover Problems Are Easy

Restricted Parameter Range Promise Set Cover Problems Are Easy

: ๋ณธ ๋…ผ๋ฌธ์€ ์„ธํŠธ ์ปค๋ฒ„ ๋ฌธ์ œ์˜ ๋ณ€ํ˜• ์ค‘ ํ•˜๋‚˜์ธ k ๊ท ์ผ ํ•˜์ดํผ๊ทธ๋ž˜ํ”„์—์„œ์˜ ์ •์  ๋ฎ๊ฐœ ๋ฌธ์ œ์— ์ดˆ์ ์„ ๋งž์ถ”๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ์ด ๋ฌธ์ œ๋Š” ๊ณ ์ „์ ์ธ ์„ธํŠธ ์ปค๋ฒ„ ๋ฌธ์ œ์™€ ์œ ์‚ฌํ•˜์ง€๋งŒ, ๊ฐ ์—ฃ์ง€๊ฐ€ ์ •ํ™•ํžˆ k๊ฐœ์˜ ์›์†Œ๋ฅผ ํฌํ•จํ•˜๋Š” ํŠน์„ฑ์„ ๊ฐ€์ง‘๋‹ˆ๋‹ค. ๋…ผ๋ฌธ์€ ๋‘ ๊ฐ€์ง€ ์ฃผ์š” ๊ฒฐ๊ณผ๋ฅผ ์ œ์‹œํ•ฉ๋‹ˆ๋‹ค: ์ฒซ์งธ๋กœ, YES ์ธ์Šคํ„ด์Šค์—์„œ ์ •์ˆ˜ ๋ฒกํ„ฐ L(B)๋Š” n๊ฐœ์˜ ๋น„์˜ ์š”์†Œ๋ฅผ ๊ฐ–๋Š”๋‹ค๋Š” ๊ฒƒ์ž…๋‹ˆ๋‹ค. ์ด๋Š” ์ •ํ™•ํ•œ ๋ฎ๊ฐœ๊ฐ€ ์กด์žฌํ•จ์„ ์˜๋ฏธํ•˜๋ฉฐ, ์ด๋ฅผ ํ†ตํ•ด ๋ฌธ์ œ์˜ ํ•ด๊ฒฐ ๊ฐ€๋Šฅ์„ฑ์„ ํ™•์ธํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ๋‘˜์งธ๋กœ, NO ์ธ์Šคํ„ด์Šค์—์„œ๋Š” L(B)๊ฐ€ ์ตœ๋Œ€ 2(nฮท(m)d)๊ฐœ์˜ ๋น„์˜ ์š”์†Œ๋งŒ ๊ฐ€์ง‘๋‹ˆ๋‹ค

Computational Complexity Computer Science
A Novel comprehensive method for real time Video Motion Detection   Surveillance

A Novel comprehensive method for real time Video Motion Detection Surveillance

๋ณธ ๋…ผ๋ฌธ์€ ์ €๋ ดํ•˜๊ณ  ํšจ์œจ์ ์ธ ์‹ค์‹œ๊ฐ„ ๋น„๋””์˜ค ๋ชจ์…˜ ๊ฐ์ง€ ๋ณด์•ˆ ์‹œ์Šคํ…œ(VMDss)์˜ ์„ค๊ณ„์™€ ๊ตฌํ˜„์„ ๋‹ค๋ฃจ๊ณ  ์žˆ๋‹ค. ์ด ์‹œ์Šคํ…œ์€ ์‚ฌ์šฉ์ž ์นœํ™”์ ์ด๊ณ  ์›๊ฒฉ ์ œ์–ด๊ฐ€ ๊ฐ€๋Šฅํ•˜๋ฉฐ, ๋ฏธ๋ฆฌ ์ •์˜๋œ ์ƒ‰์ƒ ๊ฐ์ฒด ์ถ”์  ๊ธฐ๋Šฅ์„ ํฌํ•จํ•˜๊ณ  ์žˆ์–ด ๋‹ค์–‘ํ•œ ํ™˜๊ฒฝ์—์„œ ์œ ์šฉํ•˜๊ฒŒ ํ™œ์šฉ๋  ์ˆ˜ ์žˆ๋‹ค. 1. ์‹œ์Šคํ…œ ๊ตฌ์„ฑ ์ „์†ก ์„น์…˜ : ์ปดํ“จํ„ฐ, RS232 ์ธํ„ฐํŽ˜์ด์Šค, ๋งˆ์ดํฌ๋กœ์ปจํŠธ๋กค๋Ÿฌ, RF ์†ก์‹ ๊ธฐ, RF ๋น„๋””์˜ค ์ˆ˜์‹ ๊ธฐ๋กœ ๊ตฌ์„ฑ๋˜์–ด ์žˆ์œผ๋ฉฐ, ์ด๋“ค ์š”์†Œ๋Š” ์‹œ๊ฐ ์ •๋ณด๋ฅผ ์ˆ˜์ง‘ํ•˜๊ณ  ์ œ์–ด ์‹ ํ˜ธ๋ฅผ ์ „์†กํ•˜๋Š” ์—ญํ• ์„ ์ˆ˜ํ–‰ํ•œ๋‹ค. ์ˆ˜์‹  ์„น์…˜ : ๋ชจ๋ฐ”์ผ ํ”Œ๋žซํผ, RF ์ˆ˜์‹ ๊ธฐ, ๋งˆ์ดํฌ๋กœ์ปจํŠธ๋กค๋Ÿฌ, RF ์นด๋ฉ”

Detection Computer Science Computer Vision
Towards an interoperable information infrastructure providing decision   support for genomic medicine

Towards an interoperable information infrastructure providing decision support for genomic medicine

๋ณธ ๋…ผ๋ฌธ์€ ๊ฐœ์ธ ๋งž์ถคํ˜• ์˜๋ฃŒ๋ฅผ ์‹คํ˜„ํ•˜๊ธฐ ์œ„ํ•œ ์œ ์ „์ฒด ๋ฐ์ดํ„ฐ ํ†ตํ•ฉ๊ณผ ์˜์‚ฌ๊ฒฐ์ • ์ง€์› ์‹œ์Šคํ…œ ๊ฐœ๋ฐœ์— ์ดˆ์ ์„ ๋งž์ถ”๊ณ  ์žˆ๋‹ค. ์ด๋Š” ์˜ํ•™ ๋ถ„์•ผ์—์„œ ์ƒˆ๋กœ์šด ์น˜๋ฃŒ๋ฒ•์„ ๊ฐœ๋ฐœํ•˜๊ณ , ์งˆ๋ณ‘ ๊ฐœ๋…๊ณผ ์น˜๋ฃŒ ๋ฐฉ๋ฒ•์— ๋Œ€ํ•œ ๊ทผ๋ณธ์ ์ธ ๋ณ€ํ™”๊ฐ€ ํ•„์š”ํ•จ์„ ๊ฐ•์กฐํ•œ๋‹ค. ๊ฐœ์ธ ๋งž์ถคํ˜• ์˜๋ฃŒ์˜ ํ•ต์‹ฌ์€ ํ™˜์ž์˜ ์œ ์ „์  ๋ฐฐ๊ฒฝ๊ณผ ์ƒ๋ฆฌ์  ์ง€ํ‘œ๋ฅผ ๊ณ ๋ คํ•œ ์„ธ๋ฐ€ํ•˜๊ฒŒ ์กฐ์ •๋œ ์ฆ๊ฑฐ ๊ธฐ๋ฐ˜ ์˜์‚ฌ๊ฒฐ์ •์ด๋‹ค. ์œ ์ „์ฒด ์˜ํ•™์ด ๊ฐœ์ธ ๋งž์ถคํ˜• ์˜๋ฃŒ์—์„œ ์ค‘์š”ํ•œ ์—ญํ• ์„ ํ•˜๋Š” ์ด์œ ๋Š” ์•ฝ๋ฌผ ๋ฐ˜์‘์— ๋Œ€ํ•œ ์œ ์ „์  ์š”์ธ์˜ ์ค‘์š”์„ฑ ๋•Œ๋ฌธ์ด๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ์ด๋Ÿฌํ•œ ์ •๋ณด๊ฐ€ ์‹ค์ œ ์ž„์ƒ ์‹ค๋ฌด์— ํ†ตํ•ฉ๋˜๋Š” ๊ฒƒ์€ ์—ฌ์ „ํžˆ ์ œํ•œ์ ์ด๋ฉฐ, ์˜์‚ฌ๋“ค์˜ ๊ต

Other CS Computer Science
Viva the h-index

Viva the h-index

: ์ด ๋…ผ๋ฌธ์€ h ์ธ๋ฑ์Šค๋ฅผ ๋ถ„์„ํ•˜๊ณ , ์ด๋ฅผ ํ†ตํ•ด ๊ณผํ•™์ž์˜ ์ƒ์‚ฐ๋Ÿ‰(p)๊ณผ ํ’ˆ์งˆ(q) ๊ฐ„์˜ ๊ด€๊ณ„๋ฅผ ํƒ์ƒ‰ํ•˜๋Š” ๋ฐ ์ดˆ์ ์„ ๋งž์ถ”๊ณ  ์žˆ๋‹ค. ์ €์ž๋Š” h ์ธ๋ฑ์Šค๊ฐ€ ๊ฒฐ๊ตญ ํ’ˆ์งˆ์— ์˜ํ•ด ๊ฒฐ์ •๋œ๋‹ค๋Š” 'h ์ธ๋ฑ์Šค ๋ฒ•์น™'์„ ์ œ์‹œํ•˜๋ฉฐ, ์ด๋Š” ์ดˆ๊ธฐ์—๋Š” ์ƒ์‚ฐ๋Ÿ‰์ด h ์ธ๋ฑ์Šค๋ฅผ ์ฃผ๋„ํ•˜์ง€๋งŒ ์‹œ๊ฐ„์ด ์ง€๋‚˜๋ฉด์„œ ํ’ˆ์งˆ์ด ๊ทธ ์œ„์น˜๋ฅผ ์ฐจ์ง€ํ•œ๋‹ค๋Š” ๋‚ด์šฉ์ด๋‹ค. ์ด๋Ÿฌํ•œ ๊ด€์ ์€ ๊ณผํ•™์ž๋“ค์˜ ์„ฑ๊ณผ ํ‰๊ฐ€์— ์žˆ์–ด ๋‹จ์ˆœํ•œ ์ถœํŒ๋ฌผ ์ˆ˜๋ณด๋‹ค๋Š” ์—ฐ๊ตฌ์˜ ์งˆ์  ์ธก๋ฉด์„ ๋” ์ค‘์š”ํ•˜๊ฒŒ ์—ฌ๊ฒจ์•ผ ํ•จ์„ ์‹œ์‚ฌํ•œ๋‹ค. ๋…ผ๋ฌธ์—์„œ ์ œ์‹œ๋œ h ์ธ๋ฑ์Šค ๋ฒ•์น™์€ ๋‹ค์Œ๊ณผ ๊ฐ™์€ ๋‘ ๊ฐ€์ง€ ์ฃผ์š” ์ƒํ™ฉ์„ ๊ณ ๋ คํ•œ๋‹ค. ์ฒซ์งธ, ์ €์ž์˜ ์ƒ์‚ฐ๋Ÿ‰์ด ๊ทธ

Physics Digital Libraries Computer Science
VOGCLUSTERS: an example of DAME web application

VOGCLUSTERS: an example of DAME web application

VOGCLUSTERS ํ”„๋กœ์ ํŠธ๋Š” ์ฒœ๋ฌธํ•™ ์—ฐ๊ตฌ์—์„œ ์ค‘์š”ํ•œ ์—ญํ• ์„ ํ•˜๋Š” ์€ํ•˜ ๊ตฌ๋ฆ„ ํด๋Ÿฌ์Šคํ„ฐ(GC) ๋ฐ์ดํ„ฐ๋ฅผ ํ†ตํ•ฉํ•˜๊ณ  ๋ถ„์„ํ•˜๋Š” ๋ฐ ์ดˆ์ ์„ ๋งž์ถ˜ ์›น ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์ž…๋‹ˆ๋‹ค. ์ด ๋…ผ๋ฌธ์€ VOGCLUSTERS์˜ ๊ฐœ๋ฐœ ๋ฐฐ๊ฒฝ, ๊ธฐ์ˆ ์  ๊ตฌ์„ฑ ์š”์†Œ, ๊ทธ๋ฆฌ๊ณ  ๋ฏธ๋ž˜ ๋ฐœ์ „ ๋ฐฉํ–ฅ์— ๋Œ€ํ•ด ์ƒ์„ธํžˆ ์„ค๋ช…ํ•ฉ๋‹ˆ๋‹ค. 1. ๊ฐœ๋ฐœ ๋ฐฐ๊ฒฝ ์€ํ•˜ ํƒ์‚ฌ ๋„๊ตฌ์˜ ๋ฐœ์ „๊ณผ ํ•จ๊ป˜ ์€ํ•˜ ๋‚ด ๊ตฌ๋ฆ„ ํด๋Ÿฌ์Šคํ„ฐ(GC)์— ๋Œ€ํ•œ ๋ฐ์ดํ„ฐ ์–‘์ด ์ฆ๊ฐ€ํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ์ด๋Ÿฌํ•œ ๋ฐ์ดํ„ฐ๋Š” ์ฒœ๋ฌธํ•™ ์—ฐ๊ตฌ์—์„œ ์ค‘์š”ํ•œ ์—ญํ• ์„ ํ•˜๋ฉฐ, ํŠนํžˆ ์€ํ•˜ ์ƒํƒœ์™€ ์ง„ํ™”๋ฅผ ์ดํ•ดํ•˜๋Š” ๋ฐ ์ค‘์š”ํ•ฉ๋‹ˆ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ํ˜„์žฌ ์ด๋Ÿฌํ•œ ์ •๋ณด๋Š” ๋‹ค์–‘ํ•œ ๋…ผ๋ฌธ๊ณผ

Databases Computer Science Astrophysics
VC dimension of ellipsoids

VC dimension of ellipsoids

: ๋ณธ ๋…ผ๋ฌธ์€ ์—˜๋ฆฝ์†Œ์ด๋“œ์˜ ๋ณต์žก์„ฑ์„ ์ธก์ •ํ•˜๋Š” VC ์ฐจ์›์— ๋Œ€ํ•œ ์‹ฌ์ธต์ ์ธ ์—ฐ๊ตฌ๋ฅผ ์ˆ˜ํ–‰ํ•œ๋‹ค. ์ด๋Š” ํ•™์Šต ์ด๋ก ์—์„œ ์ค‘์š”ํ•œ ๊ฐœ๋…์œผ๋กœ, ๋ฐ์ดํ„ฐ ๋ถ„์„ ๋ฐ ๋ชจ๋ธ ์„ ํƒ์— ํ™œ์šฉ๋œ๋‹ค. 1. VC ์ฐจ์›์˜ ์ •์˜์™€ ์ค‘์š”์„ฑ VC ์ฐจ์›์€ ์ง‘ํ•ฉ์ด ์–ผ๋งˆ๋‚˜ ๋ณต์žกํ•œ ํ˜•ํƒœ๋ฅผ ๊ฐ€์งˆ ์ˆ˜ ์žˆ๋Š”์ง€๋ฅผ ์ธก์ •ํ•˜๋Š” ์ง€ํ‘œ๋กœ, ๊ฒฝํ—˜์  ๊ณผ์ • ์ด๋ก , ํ†ต๊ณ„ ๋ฐ ๊ณ„์‚ฐ ํ•™์Šต ์ด๋ก , ๊ทธ๋ฆฌ๊ณ  ์ด์‚ฐ ๊ธฐํ•˜ํ•™ ๋“ฑ ๋‹ค์–‘ํ•œ ๋ถ„์•ผ์—์„œ ํ™œ์šฉ๋œ๋‹ค. ํŠนํžˆ, VC ์ฐจ์›์€ ๋ฐ์ดํ„ฐ์˜ ๋ณต์žก์„ฑ์„ ์ธก์ •ํ•˜๊ณ  ๋ชจ๋ธ ์„ ํƒ์— ์ค‘์š”ํ•œ ์—ญํ• ์„ ํ•œ๋‹ค. 2. ์—˜๋ฆฝ์†Œ์ด๋“œ์™€ ๊ฐ€์šฐ์‹œ์•ˆ ํ˜ผํ•ฉ ๋ชจ๋ธ ์—˜๋ฆฝ์†Œ์ด๋“œ๋Š” d์ฐจ์› ๊ณต๊ฐ„์—์„œ ์ •์˜๋˜๋Š” ์ง‘ํ•ฉ์œผ๋กœ,

Mathematics Statistics Computer Science Machine Learning
Implementing Continuation based language in GCC

Implementing Continuation based language in GCC

: 1. CbC์˜ ์„ค๊ณ„ ๋ชฉํ‘œ์™€ ๋ฐฐ๊ฒฝ CbC๋Š” Continuation Passing Style(CPS)์„ ๊ธฐ๋ฐ˜์œผ๋กœ ํ•œ ์ƒˆ๋กœ์šด ํ”„๋กœ๊ทธ๋ž˜๋ฐ ์–ธ์–ด๋กœ, GNU C ์ปดํŒŒ์ผ๋Ÿฌ์™€ ๋™์ผํ•œ ์†๋„๋กœ ์‹คํ–‰๋˜๋Š” ๊ฒƒ์„ ๋ชฉํ‘œ๋กœ ํ•ฉ๋‹ˆ๋‹ค. CPS ๋ณ€ํ™˜์€ ํ•จ์ˆ˜ ํ˜ธ์ถœ์„ ์—ฐ์† ์ „๋‹ฌ ์Šคํƒ€์ผ๋กœ ๋ณ€๊ฒฝํ•˜์—ฌ ์ฝ”๋“œ์˜ ํšจ์œจ์„ฑ์„ ํ–ฅ์ƒ์‹œํ‚ค๋Š” ๊ธฐ๋ฒ•์ž…๋‹ˆ๋‹ค. ์ด ๋…ผ๋ฌธ์—์„œ๋Š” ์ด๋Ÿฌํ•œ CPS ๋ณ€ํ™˜์„ GCC์— ํ†ตํ•ฉํ•˜๋Š” ๋ฐฉ๋ฒ•์„ ์ œ์‹œํ•˜๋ฉฐ, ์ด๋ฅผ ํ†ตํ•ด C์™€ CbC๋ฅผ ํ˜ผํ•ฉ ์‚ฌ์šฉํ•  ์ˆ˜ ์žˆ๋Š” ์ƒˆ๋กœ์šด ์–ธ์–ด์ธ CwC๋ฅผ ์†Œ๊ฐœํ•ฉ๋‹ˆ๋‹ค. 2. CbC์˜ ํ•ต์‹ฌ ํŠน์ง• CbC๋Š” ์ฝ”๋“œ ์„ธ๊ทธ๋จผํŠธ๋ฅผ ๊ธฐ๋ณธ ํ”„๋กœ๊ทธ๋ž˜๋ฐ ๋‹จ์œ„๋กœ ์‚ฌ์šฉํ•˜

Programming Languages Computer Science
Swiss Elections to the National Council: First trials with e-voting in   elections at federal level

Swiss Elections to the National Council: First trials with e-voting in elections at federal level

1. ์ „์žํˆฌํ‘œ ๋„์ž… ๋ฐฐ๊ฒฝ ๋ฐ ์ดˆ๊ธฐ ์‹œ๋„ ์Šค์œ„์Šค๋Š” ์ด๋ฏธ 1994๋…„๋ถ€ํ„ฐ ์šฐํŽธ ํˆฌํ‘œ๋ฅผ ํ†ตํ•ด ์›๊ฒฉ ํˆฌํ‘œ์˜ ๊ธฐ๋ฐ˜์„ ๋งˆ๋ จํ–ˆ๋‹ค. ์ด๋กœ ์ธํ•ด ์ฐธ์—ฌ์œจ์ด ์ฆ๊ฐ€ํ•˜๊ณ , ์•ฝ 90% ์ด์ƒ์˜ ํˆฌํ‘œ๊ฐ€ ์šฐํŽธ์„ ํ†ตํ•ด ์ด๋ฃจ์–ด์ง€๊ฒŒ ๋˜์—ˆ๋‹ค. ์ „์žํˆฌํ‘œ๋Š” ์ด๋Ÿฌํ•œ ์„ฑ๊ณต์ ์ธ ๊ฒฝํ—˜ ์œ„์—์„œ ๊ฐœ๋ฐœ๋˜์—ˆ์œผ๋ฉฐ, ํŠนํžˆ ํ•ด์™ธ ๊ฑฐ์ฃผ ์Šค์œ„์Šค ์œ ๊ถŒ์ž๋ฅผ ์œ„ํ•œ ์ƒˆ๋กœ์šด ํˆฌํ‘œ ์ฑ„๋„๋กœ์„œ ๋„์ž…๋˜์—ˆ๋‹ค. 2000๋…„๋ถ€ํ„ฐ ์ œ๋„ค๋ฐ”, ๋‰ด์ƒคํ…”, ์ทจ๋ฆฌํžˆ ์„ธ ์ฃผ์—์„œ ์ „์žํˆฌํ‘œ ์‹œ๋ฒ” ์šด์˜์ด ์‹œ์ž‘๋˜์—ˆ๋‹ค. ์ด ์ดˆ๊ธฐ ์‹œํ—˜ ๋‹จ๊ณ„์—์„œ๋Š” ์—ฐ๋ฐฉ์ด ๊ฐ ์ฃผ์˜ ์‹œ์Šคํ…œ ๊ฐœ๋ฐœ์— ์ž๊ธˆ์„ ์ง€์›ํ•˜๊ณ  ์กฐ์ • ์—ญํ• ์„ ์ˆ˜ํ–‰ํ–ˆ๋‹ค. ์ด๋Ÿฌํ•œ ์‹œ์Šคํ…œ์€ ์ฃผ ์ •์น˜ ์ฒด์ œ

Computers and Society Computer Science
An Efficient Paging Algorithm for Multi-Carrier CDMA System

An Efficient Paging Algorithm for Multi-Carrier CDMA System

: ๋ณธ ๋…ผ๋ฌธ์€ ๋ฌด์„  ํ†ต์‹  ๋„คํŠธ์›Œํฌ์—์„œ ๋ชจ๋ฐ”์ผ ์Šคํ…Œ์ด์…˜(MS)์„ ํšจ๊ณผ์ ์œผ๋กœ ์ถ”์ ํ•˜๊ธฐ ์œ„ํ•œ ์ƒˆ๋กœ์šด ํŽ˜์ด์ง€๋ง(Pageing) ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ์ œ์•ˆํ•œ๋‹ค. ํŠนํžˆ, ๋‹ค์ค‘ ์บ๋ฆฌ์–ด CDMA ์‹œ์Šคํ…œ์—์„œ MS๋ฅผ ๋™์‹œ์— ๊ฒ€์ƒ‰ํ•  ์ˆ˜ ์žˆ๋Š” ํšจ์œจ์ ์ธ ๋ฐฉ๋ฒ•์„ ํƒ๊ตฌํ•˜๊ณ  ์žˆ๋‹ค. ๊ธฐ์กด ๋ฌธ์ œ์  ๊ธฐ์กด์˜ ๋‹ค์ค‘ ์บ๋ฆฌ์–ด CDMA ์‹œ์Šคํ…œ์—์„œ๋Š” MS๊ฐ€ ํ•œ ๋ฒˆ์— ํ•˜๋‚˜์˜ ์บ๋ฆฌ์–ด ์ฃผํŒŒ์ˆ˜๋งŒ ์ฒญ์ทจํ•  ์ˆ˜ ์žˆ์–ด, ๋ชจ๋“  ์‚ฌ์šฉ์ž๋ฅผ ๋™์‹œ์— ๊ฒ€์ƒ‰ํ•˜๋Š” ๋ฐ ํ•œ๊ณ„๊ฐ€ ์žˆ์—ˆ๋‹ค. ์ด๋กœ ์ธํ•ด ํŽ˜์ด์ง€ ์ฑ„๋„ ์ž์›์ด ๋น„ํšจ์œจ์ ์œผ๋กœ ํ™œ์šฉ๋˜๋Š” ๋ฌธ์ œ๊ฐ€ ๋ฐœ์ƒํ–ˆ๋‹ค. ์ œ์•ˆ๋œ ์•Œ๊ณ ๋ฆฌ์ฆ˜ ๋ณธ ๋…ผ๋ฌธ์€ ์ด๋Ÿฌํ•œ ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•ด ๋™์‹œ ๊ฒ€

Networking System Computer Science
Banded Householder representation of linear subspaces

Banded Householder representation of linear subspaces

์ด ๋…ผ๋ฌธ์€ ๋Œ€์šฉ๋Ÿ‰ ํ–‰๋ ฌ์˜ ์••์ถ•๊ณผ ํ‘œํ˜„์— ๋Œ€ํ•œ ์ƒˆ๋กœ์šด ์ ‘๊ทผ๋ฒ•์„ ์ œ์‹œํ•˜๋ฉฐ, ํŠนํžˆ ํ•˜์šฐ์Šคํ™€๋” ๋ถ„ํ•ด๋ฅผ ์ด์šฉํ•œ ๋ฐฉ๋ฒ•๋ก ์„ ๊ฐ•์กฐํ•œ๋‹ค. ์ฃผ์š” ๋‚ด์šฉ์€ ๋‹ค์Œ๊ณผ ๊ฐ™๋‹ค: 1. ํ•˜์šฐ์Šคํ™€๋” QR ์•Œ๊ณ ๋ฆฌ์ฆ˜์˜ ๊ฐœ์š” : ๋…ผ๋ฌธ์€ ๋จผ์ € ํ•˜์šฐ์Šคํ™€๋” QR ์•Œ๊ณ ๋ฆฌ์ฆ˜์ด m ร— n ์ง๊ต ํ–‰๋ ฌ U ๋ฅผ n ๊ฐœ์˜ ํ•˜์šฐ์Šคํ™€๋” ๋ฐ˜์‚ฌ(reflection)์˜ ๊ณฑ์œผ๋กœ ํ‘œํ˜„ํ•˜๋Š” ๋ฐฉ๋ฒ•์„ ์„ค๋ช…ํ•œ๋‹ค. ์ด๋Š” ์ด n(m (n + 1)/2) ๊ฐœ์˜ ๋ถ€๋™ ์†Œ์ˆ˜์  ์—ฐ์‚ฐ์ด ํ•„์š”ํ•˜๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ์‹ค์ œ ์‘์šฉ์—์„œ๋Š” ํ–‰๋ ฌ์˜ ๋ฒ”์œ„๋งŒ ์ค‘์š”ํ•˜๋ฉฐ, ๋™์ผํ•œ ๋ฒ”์œ„๋ฅผ ๊ฐ€์ง€๋Š” ๋‹ค๋ฅธ ์ง๊ต ํ–‰๋ ฌ์€ ๋™๋“ฑํ•˜๋‹ค. 2. ๋ฐด๋“œ ํ•˜์šฐ์Šคํ™€๋” ๋ถ„ํ•ด

Numerical Analysis Computer Science
Complexity of Bondage and Reinforcement

Complexity of Bondage and Reinforcement

๋ณธ ๋…ผ๋ฌธ์€ ์ง€๋ฐฐ ์ง‘ํ•ฉ๊ณผ ๊ด€๋ จ๋œ ์—ฌ๋Ÿฌ ๋งค๊ฐœ๋ณ€์ˆ˜, ํŠนํžˆ ๊ฒฐํ•ฉ ์ˆซ์ž์™€ ๊ฐ•ํ™” ์ˆซ์ž์˜ ๋ณต์žก์„ฑ์„ ๋ถ„์„ํ•˜๊ณ  ์žˆ๋‹ค. ์ด๋Ÿฌํ•œ ๊ฐœ๋…๋“ค์€ ๊ทธ๋ž˜ํ”„ ์ด๋ก ์—์„œ ์ค‘์š”ํ•œ ์—ญํ• ์„ ํ•˜๋ฉฐ, ํŠนํžˆ NP ์™„์ „์„ฑ ๋ฌธ์ œ์— ๋Œ€ํ•œ ์ดํ•ด๋ฅผ ๊นŠ๊ฒŒ ํ•œ๋‹ค. 1. ์ง€๋ฐฐ ์ง‘ํ•ฉ๊ณผ ๊ด€๋ จ ๋งค๊ฐœ๋ณ€์ˆ˜ ์ง€๋ฐฐ ์ง‘ํ•ฉ์€ ๊ทธ๋ž˜ํ”„ G (V, E)์˜ ๋ชจ๋“  ๊ผญ์ง“์ ์ด ํ•ด๋‹น ์ง‘ํ•ฉ ๋‚ด์˜ ์ธ์ ‘ํ•œ ๊ผญ์ง“์ ์— ํฌํ•จ๋˜๋Š” ์ตœ์†Œ ์ง‘ํ•ฉ์ด๋‹ค. ์ด๋Š” ๊ทธ๋ž˜ํ”„์—์„œ ์ค‘์š”ํ•œ ์ •๋ณด๋ฅผ ํšจ์œจ์ ์œผ๋กœ ์ „๋‹ฌํ•˜๊ฑฐ๋‚˜ ์ปค๋ฒ„ํ•˜๋Š” ๋ฐ ์‚ฌ์šฉ๋œ๋‹ค. ์ง€๋ฐฐ ์ˆซ์ž ฮณ(G)๋Š” ์ด๋Ÿฌํ•œ ์ตœ์†Œ ์ง‘ํ•ฉ์˜ ํฌ๊ธฐ๋ฅผ ๋‚˜ํƒ€๋‚ด๋ฉฐ, ์ด๋ฅผ ๊ณ„์‚ฐํ•˜๋Š” ๋ฌธ์ œ๋Š” NP ์™„์ „์ž„์ด ์•Œ๋ ค์ ธ ์žˆ๋‹ค. ๊ฒฐํ•ฉ

Mathematics Computational Complexity Computer Science
Application of the Modified 2-opt and Jumping Gene Operators in   Multi-Objective Genetic Algorithm to solve MOTSP

Application of the Modified 2-opt and Jumping Gene Operators in Multi-Objective Genetic Algorithm to solve MOTSP

: ๋ณธ ๋…ผ๋ฌธ์€ ๋‹ค๋ชฉ์  ์—ฌํ–‰ ํŒ๋งค์› ๋ฌธ์ œ(Multi Objective Traveling Salesman Problem, MOTSP)๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•œ ์œ ์ „ ์•Œ๊ณ ๋ฆฌ์ฆ˜์˜ ํ˜์‹ ์ ์ธ ์ ‘๊ทผ๋ฒ•์„ ์ œ์•ˆํ•œ๋‹ค. ์ด ์—ฐ๊ตฌ๋Š” ํŠนํžˆ ์ˆ˜์ •๋œ 2 opt์™€ ์ ํ”„ ์œ ์ „์ž ์—ฐ์‚ฐ์ž๋ฅผ ํ™œ์šฉํ•œ Elitist ๋น„์šฐ์›” ์ •๋ ฌ ์œ ์ „ ์•Œ๊ณ ๋ฆฌ์ฆ˜(NSGA II)์— ์ดˆ์ ์„ ๋งž์ถ”๊ณ  ์žˆ๋‹ค. ๋ฌธ์ œ ์ •์˜ ๋ฐ ๋ฐฐ๊ฒฝ ์—ฌํ–‰ ํŒ๋งค์› ๋ฌธ์ œ(TSP)๋Š” ์ฃผ์–ด์ง„ ๋„์‹œ๋“ค ์‚ฌ์ด์—์„œ ๊ฐ€์žฅ ์ €๋ ดํ•œ ๊ฒฝ๋กœ๋ฅผ ์ฐพ๋Š” ๋ฌธ์ œ๋กœ, ๋‹จ์ผ ๋ชฉ์  TSP๋Š” NP ์™„์ „ ๋ฌธ์ œ์ด๋‹ค. ๋‹ค๋ชฉ์  TSP์—์„œ๋Š” ์—ฌ๋Ÿฌ ๋ชฉํ‘œ(์˜ˆ: ๋น„์šฉ๊ณผ ๊ฑฐ๋ฆฌ)๋ฅผ ์ตœ

Neural Computing Artificial Intelligence Computer Science
Complexity

Complexity

1. ํ™˜์›์ฃผ์˜์˜ ํ•œ๊ณ„ ๊ณ ์ „์ ์ธ ๊ณผํ•™ ๋ฐ ๊ณตํ•™์€ ํ˜„์ƒ์„ ๋ถ„๋ฆฌํ•˜๊ณ  ๋‹จ์ˆœํ™”ํ•˜์—ฌ ๋ฏธ๋ž˜๋ฅผ ์˜ˆ์ธกํ•˜๋Š” ํ™˜์›์ฃผ์˜ ๋ฐฉ๋ฒ•๋ก ์„ ์„ฑ๊ณต์ ์œผ๋กœ ํ™œ์šฉํ•ด ์™”์Šต๋‹ˆ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ์ตœ๊ทผ ๋ช‡ ์‹ญ ๋…„๊ฐ„, ์ƒํ˜ธ์ž‘์šฉ์ด ์ค‘์š”ํ•œ ํ˜„์ƒ์—์„œ ํ™˜์›์ฃผ์˜์˜ ํ•œ๊ณ„๊ฐ€ ๋“œ๋Ÿฌ๋‚ฌ์Šต๋‹ˆ๋‹ค. ํ™˜์›์ฃผ์˜๋Š” ๋ถ„๋ฆฌํ•˜๋Š” ํŠน์„ฑ ๋•Œ๋ฌธ์— ์ƒํ˜ธ์ž‘์šฉ์„ ๊ฐ„๊ณผํ•ด์•ผ ํ•ฉ๋‹ˆ๋‹ค. ์˜ˆ๋ฅผ ๋“ค์–ด, ๊ฐœ๋ฏธ ๊ตฐ๋ฝ์ด๋‚˜ ์ƒˆ ๋–ผ์™€ ๊ฐ™์€ ์ง‘๋‹จ ํ–‰๋™์€ ๊ฐœ๋ณ„ ์š”์†Œ์˜ ํ–‰๋™๋งŒ์œผ๋กœ ์„ค๋ช…ํ•˜๊ธฐ ์–ด๋ ต๊ณ , ์ด์›ƒ์˜ ํ–‰๋™์— ๋”ฐ๋ผ ํ˜„์ง€ ๊ฒฐ์ •์„ ๋‚ด๋ฆฌ๋Š” ์ƒํ˜ธ์ž‘์šฉ์ด ์ค‘์š”ํ•ฉ๋‹ˆ๋‹ค. 2. ๋ณต์žก์„ฑ๊ณผ ๋ฐœ์ƒ์  ์†์„ฑ ๋ณต์žกํ•œ ์‹œ์Šคํ…œ์—์„œ๋Š” ์‹œ์Šคํ…œ์˜ '๋ฒ•์น™'๊ณผ ์ดˆ๊ธฐ ๋ฐ ๊ฒฝ๊ณ„ ์กฐ๊ฑด๋งŒ์œผ๋กœ๋Š” ์‚ฌ์ „

Other CS Computer Science
A Frequent Closed Itemsets Lattice-based Approach for Mining Minimal   Non-Redundant Association Rules

A Frequent Closed Itemsets Lattice-based Approach for Mining Minimal Non-Redundant Association Rules

: ๋ณธ ๋…ผ๋ฌธ์€ ํ˜‘์—… ๊ทœ์น™ ์ถ”์ถœ ๊ณผ์ •์—์„œ ์ค‘์š”ํ•œ ๋‘ ๋‹จ๊ณ„, ์ฆ‰ ๋นˆ๋„ ํ•ญ๋ชฉ ์ง‘ํ•ฉ(Frequent Itemsets)์˜ ๋ฐœ๊ฒฌ๊ณผ ์ด๋ฅผ ๋ฐ”ํƒ•์œผ๋กœ ํ•œ ํ˜‘์—… ๊ทœ์น™ ์ƒ์„ฑ์— ์ดˆ์ ์„ ๋งž์ถ”๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ํŠนํžˆ, ์ด ์—ฐ๊ตฌ๋Š” ์ตœ์†Œ ๋น„์ค‘๋ณต ์—ฐ๊ด€ ๊ทœ์น™(MNAR) ์ถ”์ถœ์„ ์œ„ํ•œ ์ƒˆ๋กœ์šด ์ ‘๊ทผ๋ฒ•์„ ์ œ์•ˆํ•˜๋ฉฐ, ๊ธฐ์กด ๋ฐฉ๋ฒ•๋“ค๊ณผ ๋น„๊ต ๋ถ„์„์„ ํ†ตํ•ด ๊ทธ ํšจ์œจ์„ฑ์„ ์ž…์ฆํ•˜๊ณ ์ž ํ•ฉ๋‹ˆ๋‹ค. 1. ํ˜‘์—… ๊ทœ์น™ ์ถ”์ถœ์˜ ๊ธฐ๋ณธ ๊ฐœ๋…๊ณผ ์•Œ๊ณ ๋ฆฌ์ฆ˜ ํ˜‘์—… ๊ทœ์น™ ์ถ”์ถœ์€ ํฌ๊ฒŒ ๋‘ ๋‹จ๊ณ„๋กœ ๋‚˜๋ˆŒ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค: ๋นˆ๋„ ํ•ญ๋ชฉ ์ง‘ํ•ฉ(FI) ๋˜๋Š” ๋นˆ๋„ ๋‹ซํžŒ ํ•ญ๋ชฉ ์ง‘ํ•ฉ(FCI)์„ ์ฐพ๋Š” ๊ณผ์ •๊ณผ ์ด๋ฅผ ๋ฐ”ํƒ•์œผ๋กœ ํ˜‘์—… ๊ทœ์น™์„ ์ƒ

Databases Computer Science
Comparison Of The Consumption Of Resources Between HTTP And SIP

Comparison Of The Consumption Of Resources Between HTTP And SIP

๋ณธ ๋…ผ๋ฌธ์€ HTTP์™€ SIP ํ”„๋กœํ† ์ฝœ์˜ ์ž์› ์†Œ๋น„๋ฅผ ๋น„๊ต ๋ถ„์„ํ•˜๋Š”๋ฐ ์ดˆ์ ์„ ๋งž์ถ”๊ณ  ์žˆ๋‹ค. VoIP ๊ธฐ์ˆ ์˜ ์„ฑ์žฅ๊ณผ ํ•จ๊ป˜, Asterisk๋ผ๋Š” ์˜คํ”ˆ์†Œ์Šค ์†”๋ฃจ์…˜์ด ๋„๋ฆฌ ์‚ฌ์šฉ๋˜๊ณ  ์žˆ์œผ๋ฉฐ, ์ด๋ฅผ ํ†ตํ•ด ์ €๋น„์šฉ์œผ๋กœ ํ†ต์‹  ์ธํ”„๋ผ๋ฅผ ๊ตฌ์ถ•ํ•  ์ˆ˜ ์žˆ๋Š” ๊ฐ€๋Šฅ์„ฑ์„ ๋ณด์—ฌ์ฃผ๊ณ  ์žˆ๋‹ค. ์‹คํ—˜ ํ™˜๊ฒฝ ๋ฐ ๋ฐฉ๋ฒ•๋ก  ์‹คํ—˜์€ Dell Optiplex GX 110 ์„œ๋ฒ„์™€ ํด๋ผ์ด์–ธํŠธ๋ฅผ ์ด์šฉํ•˜์—ฌ ์ˆ˜ํ–‰๋˜์—ˆ์œผ๋ฉฐ, ์šด์˜์ฒด์ œ๋Š” Debian GNU/Linux๊ฐ€ ์‚ฌ์šฉ๋˜์—ˆ๋‹ค. ์›น ์„œ๋ฒ„๋กœ Apache๋ฅผ, VoIP ์„œ๋ฒ„๋กœ Asterisk๋ฅผ ๊ฐ๊ฐ ์‚ฌ์šฉํ•˜์˜€๋‹ค. ๋ฉ”๋ชจ๋ฆฌ ์†Œ๋น„๋Ÿ‰์„ ์ธก์ •ํ•˜๊ธฐ ์œ„ํ•ด TOP

Networking Computer Science

< Category Statistics (Total: 743) >

Electrical Engineering and Systems Science
7
General
272
General Relativity
7
HEP-EX
5
HEP-PH
12
HEP-TH
5
MATH-PH
3
NUCL-TH
1
Quantum Physics
10

Start searching

Enter keywords to search articles

โ†‘โ†“
โ†ต
ESC
โŒ˜K Shortcut