Sciweavers

2180 search results - page 174 / 436
» Comparing bio-inspired algorithms in constrained optimizatio...
Sort
View
SAC
2010
ACM
15 years 10 months ago
A simple role mining algorithm
Complex organizations need to establish access control policies in order to manage access to restricted resources. Role Based Access Control paradigm has been introduced in ’90 ...
Carlo Blundo, Stelvio Cimato
135
Voted
DAC
2012
ACM
13 years 5 months ago
A metric for layout-friendly microarchitecture optimization in high-level synthesis
In this work we address the problem of managing interconnect timing in high-level synthesis by generating a layoutfriendly microarchitecture. A metric called spreading score is pr...
Jason Cong, Bin Liu
123
Voted
SMA
2006
ACM
132views Solid Modeling» more  SMA 2006»
15 years 9 months ago
Generalized penetration depth computation
— We present an efficient algorithm to compute the generalized penetration depth (PDg) between rigid models. Given two overlapping objects, our algorithm attempts to compute the...
Liangjun Zhang, Young J. Kim, Gokul Varadhan, Dine...
ICIP
2004
IEEE
16 years 5 months ago
Estimation of mixtures of probabilistic pca with stochastic em for the 3d biplanar reconstruction of scoliotic rib cage
In this paper, we present a robust method for estimating the model parameters in a mixture of probabilistic principal component analyzers. This method is based on the Stochastic v...
François Destrempes, Jacques A. de Guise, M...
117
Voted
CLEIEJ
2004
119views more  CLEIEJ 2004»
15 years 3 months ago
Pump Scheduling Optimization Using Asynchronous Parallel
Optimizing the pump-scheduling is an interesting proposal to achieve cost reductions in water distribution pumping stations. As systems grow, pump-scheduling becomes a very diffic...
Christian von Lücken, Benjamín Bar&aac...