Abstract: We propose a general attack framework based on evolutionary algorithms to quickly and efficiently generate low-perturbation adversarial samples for 3D point cloud data. Specifically, we ...
A production-ready distributed rate limiter supporting five algorithms (Token Bucket, Sliding Window, Fixed Window, Leaky Bucket, and Composite) with Redis backing for high-performance API protection.
Abstract: High-frequency induction logging is a crucial technique in subsurface exploration, particularly in the oil and gas industry. It involves transmitting electromagnetic signals into the ground ...
Kruskal’s algorithm finds a Minimum Spanning Tree (MST) by building it edge by edge, always choosing the cheapest edge that doesn’t create a cycle. Sorting all edges in the graph from smallest weight ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results