Sciweavers

1486 search results - page 85 / 298
» Algorithms for two-box covering
Sort
View
AI
2001
Springer
15 years 8 months ago
Search Techniques for Non-linear Constraint Satisfaction Problems with Inequalities
In recent years, interval constraint-based solvers have shown their ability to efficiently solve challenging non-linear real constraint problems. However, most of the working syst...
Marius-Calin Silaghi, Djamila Sam-Haroud, Boi Falt...
126
Voted
IJACTAICIT
2010
361views more  IJACTAICIT 2010»
15 years 1 months ago
A Proposed Technique for Information Hiding Based on DCT
The aim of this work is to design an algorithm which combines between steganography and cryptography that can hide a text in an image in a way that prevents, as much as possible, ...
Fadhil Salman Abed, Nada Abdul Aziz Mustafa
APPROX
2011
Springer
249views Algorithms» more  APPROX 2011»
14 years 3 months ago
A Canonical Form for Testing Boolean Function Properties
In a well-known result Goldreich and Trevisan (2003) showed that every testable graph property has a “canonical” tester in which a set of vertices is selected at random and the...
Dana Dachman-Soled, Rocco A. Servedio

Book
534views
17 years 2 months ago
Neural Networks - A Systematic Introduction
This book covers the following topics: The biological paradigm, Threshold logic, Weighted Networks, The Perceptron, Perceptron learning, Unsupervised learning and clustering algori...
Raul Rojas
MMB
1999
Springer
127views Communications» more  MMB 1999»
15 years 8 months ago
Auction Models for Multi-Provider Internet Connections
Auctions are a widely used approach for determining the current market price for congested resources. However, using them for real systems, such as the Internet, the auction algor...
Peter Reichl, George Fankhauser, Burkhard Stiller