Sciweavers

2899 search results - page 500 / 580
» Engineering Optimization Using a Simple Evolutionary Algorit...
Sort
View
ICALP
2009
Springer
16 years 2 months ago
Correlation Clustering Revisited: The "True" Cost of Error Minimization Problems
Correlation Clustering was defined by Bansal, Blum, and Chawla as the problem of clustering a set of elements based on a possibly inconsistent binary similarity function between e...
Nir Ailon, Edo Liberty
ICA
2010
Springer
15 years 3 months ago
Binary Sparse Coding
We study a sparse coding learning algorithm that allows for a simultaneous learning of the data sparseness and the basis functions. The algorithm is derived based on a generative m...
Marc Henniges, Gervasio Puertas, Jörg Bornsch...
EMSOFT
2003
Springer
15 years 7 months ago
Rate Monotonic vs. EDF: Judgment Day
Since the first results published in 1973 by Liu and Layland on the Rate Monotonic (RM) and Earliest Deadline First (EDF) algorithms, a lot of progress has been made in the schedu...
Giorgio C. Buttazzo
APGV
2007
ACM
124views Visualization» more  APGV 2007»
15 years 6 months ago
A perceptive evaluation of volume rendering techniques
The display of space filling data is still a challenge for the community of visualization. Direct Volume Rendering (DVR) is one of the most important techniques developed to achie...
Christian Boucheny, Georges-Pierre Bonneau, Jacque...
WORM
2003
15 years 3 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...