Sciweavers

2157 search results - page 297 / 432
» Binary ant algorithm
Sort
View
ICIP
2008
IEEE
15 years 11 months ago
Iterative pre- and post-processing for MRC layers of scanned documents
The Mixed Raster Content (MRC) document compression standard (ITU T.44) specifies a multi-layer multi-resolution representation of a compound document. The model is very efficie...
Alexandre Zaghetto, Ricardo L. de Queiroz
ISMVL
2008
IEEE
148views Hardware» more  ISMVL 2008»
15 years 11 months ago
Quantum Logic Implementation of Unary Arithmetic Operations
The mathematical property of inheritance for certain unary fixed point operations has recently been exploited to enable the efficient formulation of arithmetic algorithms and circ...
Mitchell A. Thornton, David W. Matula, Laura Spenn...
ADMA
2008
Springer
152views Data Mining» more  ADMA 2008»
15 years 11 months ago
MPSQAR: Mining Quantitative Association Rules Preserving Semantics
To avoid the loss of semantic information due to the partition of quantitative values, this paper proposes a novel algorithm, called MPSQAR, to handle the quantitative association ...
Chunqiu Zeng, Jie Zuo, Chuan Li, Kaikuo Xu, Shengq...
ACSAC
2007
IEEE
15 years 11 months ago
Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting
We present an extension of traditional "black box" fuzz testing using a genetic algorithm based upon a Dynamic Markov Model fitness heuristic. This heuristic allows us t...
Sherri Sparks, Shawn Embleton, Ryan Cunningham, Cl...
ICDM
2007
IEEE
104views Data Mining» more  ICDM 2007»
15 years 11 months ago
Secure Logistic Regression of Horizontally and Vertically Partitioned Distributed Databases
Privacy-preserving data mining (PPDM) techniques aim to construct efficient data mining algorithms while maintaining privacy. Statistical disclosure limitation (SDL) techniques a...
Aleksandra B. Slavkovic, Yuval Nardi, Matthew M. T...