Sciweavers

10907 search results - page 2069 / 2182
» Constraint Based Strategies
Sort
View
GECCO
2008
Springer
143views Optimization» more  GECCO 2008»
14 years 11 months ago
Application domain study of evolutionary algorithms in optimization problems
This paper deals with the problem of comparing and testing evolutionary algorithms, that is, the benchmarking problem, from an analysis point of view. A practical study of the app...
Pilar Caamaño, Francisco Bellas, José...
ICFP
2010
ACM
14 years 11 months ago
Security-typed programming within dependently typed programming
Several recent security-typed programming languages, such as Aura, PCML5, and Fine, allow programmers to express and enforce access control and information flow policies. Most of ...
Jamie Morgenstern, Daniel R. Licata
CVPR
2010
IEEE
14 years 10 months ago
High performance object detection by collaborative learning of Joint Ranking of Granules features
Object detection remains an important but challenging task in computer vision. We present a method that combines high accuracy with high efficiency. We adopt simplified forms of...
Chang Huang, Ramakant Nevatia
MM
2010
ACM
148views Multimedia» more  MM 2010»
14 years 10 months ago
RAPID: a reliable protocol for improving delay
Recently, there has been a dramatic increase in interactive cloud based software applications (e.g. working on remote machines, online games, interactive websites such as financia...
Sanjeev Mehrotra, Jin Li, Cheng Huang
RECSYS
2010
ACM
14 years 10 months ago
Affiliation recommendation using auxiliary networks
Social network analysis has attracted increasing attention in recent years. In many social networks, besides friendship links amongst users, the phenomenon of users associating th...
Vishvas Vasuki, Nagarajan Natarajan, Zhengdong Lu,...
« Prev « First page 2069 / 2182 Last » Next »