Bidirectional implementation of Markov/CCMT for dynamic reliability analysis with application to digital I&C systems

J Yang, B Zou, M Yang - Reliability Engineering & System Safety, 2019 - Elsevier
… first search strategy is used in bidirectional search of Markov/CCMT algorithm to guarantee
a complete and optimal solution to specific application analysis. In the single search graph …

Bidirectional discrete matrix factorization hashing for image search

S He, B Wang, Z Wang, Y Yang, F Shen… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
… In this article, we propose a novel approach, called bidirectional discrete matrix factorization
hashing (BDMFH), which alternates two mutually promoted processes of 1) learning binary …

Searching for a search method: Benchmarking search algorithms for generating NLP adversarial examples

JY Yoo, JX Morris, E Lifland, Y Qi - arXiv preprint arXiv:2009.06368, 2020 - arxiv.org
… We can see that beam search algorithms consistently perturb the lowest percentage of
words. Furthermore, we see that a fewer number of words perturbed generally corresponds with …

Machine translation decoding beyond beam search

R Leblond, JB Alayrac, L Sifre, M Pislar… - arXiv preprint arXiv …, 2021 - arxiv.org
… Notably, we introduce a Monte-Carlo Tree Search (MCTS) based method and showcase its
… We find that which algorithm is best heavily depends on the characteristics of the goal metric…

Improving multilingual sentence embedding using bi-directional dual encoder with additive margin softmax

Y Yang, GH Abrego, S Yuan, M Guo, Q Shen… - arXiv preprint arXiv …, 2019 - arxiv.org
… i We introduce a novel bidirectional and additive margin softmax into the dual encoder …
We introduce a bidirectional learning objective,Ls that explicitly optimizes both forward and …

A lightweight and attack-proof bidirectional blockchain paradigm for internet of things

C Xu, Y Qu, TH Luan, PW Eklund… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
… To defeat these attacks, a novel bidirectional-linked blockchain (BLB) using chameleon
hash functions is proposed, where bidirectional pointers are constructed between blocks. …

Bidirectional prediction-based underwater data collection protocol for end-edge-cloud orchestrated system

T Wang, D Zhao, S Cai, W Jia… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
… In this article, a two-level bidirectional data prediction model (TBDP) for end-edge-cloud
orchestration system is proposed. The bidirectional prediction method ensures that one party …

Effects of bidirectional resource allocation schemes for advanced long-term evolution system in heterogeneous networks

R Gatti, S Shankar, K Murthy - International Journal of …, 2021 - inderscienceonline.com
… This paper studies the bidirectional radio resource scheduling schemes which exploit
cross-tier interference. The proposed modified joint uplink/downlink user carrier scheduling (…

Distributed in-memory trajectory similarity search and join on road network

H Yuan, G Li - 2019 IEEE 35th international conference on data …, 2019 - ieeexplore.ieee.org
… Therefore, similar to finding longest common substring between two strings, we find longest
common road segments between two trajectories and compute the length of these segments…

Simultaneous bi-directional communications and data forwarding using a single ZigBee data stream

Z Chi, Y Li, H Sun, Z Huang… - IEEE/ACM Transactions on …, 2021 - ieeexplore.ieee.org
search problem can be solved with an efficient search in the handshaking protocol. We
frame the search … We define the search as the maximum length of sequential power levels in …