Sciweavers

2157 search results - page 348 / 432
» Binary ant algorithm
Sort
View
169
Voted
IESS
2009
Springer
182views Hardware» more  IESS 2009»
15 years 8 days ago
Modeling Cache Effects at the Transaction Level
Abstract. Embedded system design complexities are growing exponentially. Demand has increased for modeling techniques that can provide both accurate measurements of delay and fast ...
Ardavan Pedram, David Craven, Andreas Gerstlauer
135
Voted
COMSIS
2010
14 years 12 months ago
A novel hierarchical speech emotion recognition method based on improved DDAGSVM
In order to improve the recognition accuracy of speech emotion recognition, in this paper, a novel hierarchical method based on improved Decision Directed Acyclic Graph SVM (improv...
Qi-Rong Mao, Yong-Zhao Zhan
130
Voted
CORR
2010
Springer
116views Education» more  CORR 2010»
14 years 9 months ago
Mixed-Membership Stochastic Block-Models for Transactional Networks
Abstract: Transactional network data can be thought of as a list of oneto-many communications (e.g., email) between nodes in a social network. Most social network models convert th...
Mahdi Shafiei, Hugh Chipman
PAMI
2011
14 years 9 months ago
Applying Property Testing to an Image Partitioning Problem
—Property testing is a rapidly growing field of research. Typically, a property testing algorithm proceeds by quickly determining whether an input can satisfy some condition, und...
Igor Kleiner, Daniel Keren, Ilan Newman, Oren Ben-...
144
Voted
IJNSEC
2010
324views more  IJNSEC 2010»
14 years 9 months ago
Computing the Modular Inverse of a Polynomial Function over GF(2P) Using Bit Wise Operation
Most public key crypto systems use finite field modulo arithmetic. This modulo arithmetic is applied on real numbers, binary values and polynomial functions. The computation cost ...
Rajaram Ramasamy, Amutha Prabakar Muniyandi