Sciweavers

476 search results - page 65 / 96
» Algorithm, Implementation and Application of the SIM-DL Simi...
Sort
View
CORR
2007
Springer
147views Education» more  CORR 2007»
15 years 3 months ago
Coding Solutions for the Secure Biometric Storage Problem
—The paper studies the problem of securely storing biometric passwords, such as fingerprints and irises. With the help of coding theory Juels and Wattenberg derived in 1999 a sc...
Davide Schipani, Joachim Rosenthal
EUROSYS
2006
ACM
16 years 24 days ago
Solving the starting problem: device drivers as self-describing artifacts
Run-time conflicts can affect even the most rigorously tested software systems. A reliance on execution-based testing makes it prohibitively costly to test every possible interac...
Michael F. Spear, Tom Roeder, Orion Hodson, Galen ...
144
Voted
ICANNGA
2009
Springer
203views Algorithms» more  ICANNGA 2009»
15 years 10 months ago
NEAT in HyperNEAT Substituted with Genetic Programming
In this paper we present application of genetic programming (GP) [1] to evolution of indirect encoding of neural network weights. We compare usage of original HyperNEAT algorithm w...
Zdenek Buk, Jan Koutník, Miroslav Snorek
133
Voted
SOCA
2007
IEEE
15 years 10 months ago
Structure Matching for Enhancing UDDI Queries Results
To enhance UDDI query capability, typically based on taxonomic classification, semantic matching is assuming a key role. Even if we recognize the great importance of semantics in ...
Giancarlo Tretola, Eugenio Zimeo
CF
2004
ACM
15 years 9 months ago
Improving the execution time of global communication operations
Many parallel applications from scientific computing use MPI global communication operations to collect or distribute data. Since the execution times of these communication opera...
Matthias Kühnemann, Thomas Rauber, Gudula R&u...