Sciweavers

1548 search results - page 252 / 310
» Estimating Software Vulnerabilities
Sort
View
TASLP
2011
14 years 6 months ago
Time-Domain Blind Separation of Audio Sources on the Basis of a Complete ICA Decomposition of an Observation Space
—Time-domain algorithms for blind separation of audio sources can be classified as being based either on a partial or complete decomposition of an observation space. The decompo...
Zbynek Koldovský, Petr Tichavský
SOCO
2010
Springer
14 years 5 months ago
Designing multilayer perceptrons using a Guided Saw-tooth Evolutionary Programming Algorithm
In this paper, a diversity generating mechanism is proposed for an Evolutionary Programming (EP) algorithm that determines the basic structure of Multilayer Perceptron classifiers ...
Pedro Antonio Gutiérrez, César Herv&...
93
Voted
SIAMAM
2011
14 years 5 months ago
Electromechanical Coupling in Cardiac Dynamics: The Active Strain Approach
The coupling between cardiac mechanics and electric signaling is addressed in a nonstandard framework in which the electrical potential dictates the active strain (not stress) of t...
D. Ambrosi, G. Arioli, F. Nobile, Alfio Quarteroni
PPOPP
2011
ACM
14 years 1 months ago
ScalaExtrap: trace-based communication extrapolation for spmd programs
Performance modeling for scientific applications is important for assessing potential application performance and systems procurement in high-performance computing (HPC). Recent ...
Xing Wu, Frank Mueller
PAMI
2012
13 years 1 months ago
CPMC: Automatic Object Segmentation Using Constrained Parametric Min-Cuts
—We present a novel framework to generate and rank plausible hypotheses for the spatial extent of objects in images using bottom-up computational processes and mid-level selectio...
João Carreira, Cristian Sminchisescu