Some Cryptography Models Designed by Double Odd-Edge Labelling of Trees.
Hongyu WangJin XuBing YaoPublished in: CIT (2017)
Keyphrases
- databases
- tree models
- statistical models
- probabilistic model
- machine learning
- decision trees
- neural network
- statistical model
- cellular automata
- markov random field
- data sets
- human pose estimation
- computational models
- neural network model
- complex systems
- model selection
- information retrieval
- least squares
- relational databases
- data structure
- similarity measure
- three dimensional
- image processing