Sciweavers

2899 search results - page 500 / 580
» Engineering Optimization Using a Simple Evolutionary Algorit...
Sort
View
92
Voted
ICALP
2009
Springer
16 years 28 days ago
Correlation Clustering Revisited: The "True" Cost of Error Minimization Problems
Correlation Clustering was defined by Bansal, Blum, and Chawla as the problem of clustering a set of elements based on a possibly inconsistent binary similarity function between e...
Nir Ailon, Edo Liberty
ICA
2010
Springer
15 years 1 months ago
Binary Sparse Coding
We study a sparse coding learning algorithm that allows for a simultaneous learning of the data sparseness and the basis functions. The algorithm is derived based on a generative m...
Marc Henniges, Gervasio Puertas, Jörg Bornsch...
81
Voted
EMSOFT
2003
Springer
15 years 5 months ago
Rate Monotonic vs. EDF: Judgment Day
Since the first results published in 1973 by Liu and Layland on the Rate Monotonic (RM) and Earliest Deadline First (EDF) algorithms, a lot of progress has been made in the schedu...
Giorgio C. Buttazzo
94
Voted
APGV
2007
ACM
124views Visualization» more  APGV 2007»
15 years 4 months ago
A perceptive evaluation of volume rendering techniques
The display of space filling data is still a challenge for the community of visualization. Direct Volume Rendering (DVR) is one of the most important techniques developed to achie...
Christian Boucheny, Georges-Pierre Bonneau, Jacque...
110
Voted
WORM
2003
15 years 2 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...