Sciweavers

1224 search results - page 146 / 245
» Concept Search
Sort
View
124
Voted
CEC
2008
IEEE
15 years 7 months ago
Solving deceptive problems using a genetic algorithm with reserve selection
— Deceptive problems are a class of challenging problems for conventional genetic algorithms (GAs), which usually mislead the search to some local optima rather than the global o...
Yang Chen, Jinglu Hu, Kotaro Hirasawa, Songnian Yu
91
Voted
ICASSP
2008
IEEE
15 years 7 months ago
High rate data hiding in ACELP speech codecs
A new method for hiding digital data in the bitstream of an ACELP speech codec is proposed in this paper. The key element of our method is an alternative search strategy for the A...
Bernd Geiser, Peter Vary
81
Voted
ICC
2008
IEEE
15 years 7 months ago
A Two-Stage Sensing Technique for Dynamic Spectrum Access
—Dynamic spectrum access (DSA) is a promising approach for mitigating spectrum scarcity. Underlying DSA is the need for fast and reliable spectrum sensing over a potentially larg...
Ling Luo, Sumit Roy
90
Voted
SCAM
2008
IEEE
15 years 7 months ago
Constructing Subtle Faults Using Higher Order Mutation Testing
Traditional mutation testing considers only first order mutants, created by the injection of a single fault. Often these first order mutants denote trivial faults that are easil...
Yue Jia, Mark Harman
DATE
2007
IEEE
101views Hardware» more  DATE 2007»
15 years 7 months ago
Polynomial-time subgraph enumeration for automated instruction set extension
This paper proposes a novel algorithm that, given a data-flow graph and an input/output constraint, enumerates all convex subgraphs under the given constraint in polynomial time ...
Paolo Bonzini, Laura Pozzi