Sciweavers

14078 search results - page 2479 / 2816
» Design and Analysis of Computer Algorithms
Sort
View
IEEEPACT
2008
IEEE
15 years 11 months ago
Exploiting loop-dependent stream reuse for stream processors
The memory access limits the performance of stream processors. By exploiting the reuse of data held in the Stream Register File (SRF), an on-chip storage, the number of memory acc...
Xuejun Yang, Ying Zhang, Jingling Xue, Ian Rogers,...
129
Voted
WCNC
2008
IEEE
15 years 11 months ago
A Density Adaptive Routing Protocol for Large-Scale Ad Hoc Networks
Abstract—Position-based routing protocols use location information to refine the traditional packet flooding method in mobile ad hoc networks. They mainly focus on densely and ...
Zhizhou Li, Yaxiong Zhao, Yong Cui, Dong Xiang
149
Voted
AMFG
2007
IEEE
315views Biometrics» more  AMFG 2007»
15 years 11 months ago
Structured Ordinal Features for Appearance-Based Object Representation
In this paper, we propose a novel appearance-based representation, called Structured Ordinal Feature (SOF). SOF is a binary string encoded by combining eight ordinal blocks in a ci...
ShengCai Liao, Zhen Lei, Stan Z. Li, Xiaotong Yuan...
CEC
2007
IEEE
15 years 11 months ago
Covariance matrix repairing in Gaussian based EDAs
— Gaussian models are widely adopted in continuous Estimation of Distribution Algorithms (EDAs). In this paper, we analyze continuous EDAs and show that they don’t always work ...
Weishan Dong, Xin Yao
ICDM
2007
IEEE
192views Data Mining» more  ICDM 2007»
15 years 11 months ago
Discovering Temporal Communities from Social Network Documents
Discovering communities from documents involved in social discourse is an important topic in social network analysis, enabling greater understanding of the relationships among act...
Ding Zhou, Isaac G. Councill, Hongyuan Zha, C. Lee...
« Prev « First page 2479 / 2816 Last » Next »