Sciweavers

7978 search results - page 161 / 1596
» Combining shared-coin algorithms
Sort
View
116
Voted
ICGA
1993
157views Optimization» more  ICGA 1993»
15 years 5 months ago
Optimal Interaction of Mutation and Crossover in the Breeder Genetic Algorithm
The dynamic behavior of mutation and crossover is investigated with the Breeder Genetic Algorithm. The main emphasis is on binary functions. The genetic operators are compared nea...
Heinz Mühlenbein, Dirk Schlierkamp-Voosen
141
Voted
VLDB
2002
ACM
106views Database» more  VLDB 2002»
15 years 3 months ago
Efficient Algorithms for Processing XPath Queries
Our experimental analysis of several popular XPath processors reveals a striking fact: Query evaluation in each of the systems requires time exponential in the size of queries in ...
Georg Gottlob, Christoph Koch, Reinhard Pichler
155
Voted
RC
2007
113views more  RC 2007»
15 years 3 months ago
A Search Algorithm for Calculating Validated Reliability Bounds
The search algorithm presented allows the CDF of a dependent variable to be bounded with 100%confidence,andallowsforaguaranteedevaluationof theerror involved.Thesereliabilitybound...
Fulvio Tonon
268
Voted

Book
3022views
17 years 3 days ago
Algorithms for Programmers
"This is the (work in progress) book "Algorithms for Programmers". Publication as soon as possible, content is (modulo copy editing) close to final version. I will p...
Jörg Arndt
ICMCS
2007
IEEE
203views Multimedia» more  ICMCS 2007»
15 years 10 months ago
Attacking Some Perceptual Image Hash Algorithms
Perceptual hashing is an emerging solution for multimedia content authentication. Due to their robustness, such techniques might not work well when malicious attack is perceptuall...
Li Weng, Bart Preneel