Sciweavers

2391 search results - page 240 / 479
» A Portfolio Approach to Algorithm Selection
Sort
View
ISCC
2003
IEEE
138views Communications» more  ISCC 2003»
15 years 9 months ago
Connectivity Aware Routing - a Method for Finding Bandwidth Constrained Paths Over a Variety of Network Topologies
Multimedia traffic and real-time e-commerce applications can experience quality degradation in traditional networks such as the Internet. These difficulties can be overcome in n...
Karol Kowalik, Martin Collier
127
Voted
GFKL
2006
Springer
78views Data Mining» more  GFKL 2006»
15 years 7 months ago
Putting Successor Variety Stemming to Work
Stemming algorithms find canonical forms for inflected words, e. g. for declined nouns or conjugated verbs. Since such a unification of words with respect to gender, number, time, ...
Benno Stein, Martin Potthast
120
Voted
GECCO
2008
Springer
117views Optimization» more  GECCO 2008»
15 years 4 months ago
Non-monotone differential evolution
The Differential Evolution algorithm uses an elitist selection, constantly pushing the population in a strict downhill search, in an attempt to guarantee the conservation of the ...
Michael G. Epitropakis, Vassilis P. Plagianakos, M...
142
Voted
ICRA
2008
IEEE
204views Robotics» more  ICRA 2008»
15 years 10 months ago
Active exploration and keypoint clustering for object recognition
— Object recognition is a challenging problem for artificial systems. This is especially true for objects that are placed in cluttered and uncontrolled environments. To challenge...
Gert Kootstra, Jelmer Ypma, Bart de Boer
128
Voted
ICPP
2005
IEEE
15 years 9 months ago
Connected k-Hop Clustering in Ad Hoc Networks
In wireless ad hoc networks, clustering is one of the most important approaches for many applications. A connected k-hop clustering network is formed by electing clusterheads in k...
Shuhui Yang, Jie Wu, Jiannong Cao