Sciweavers

10909 search results - page 323 / 2182
» Evaluating Backup Algorithms
Sort
View
ISMIR
2004
Springer
100views Music» more  ISMIR 2004»
15 years 10 months ago
Well-Tempered Spelling: A Key Invariant Pitch Spelling Algorithm
In this paper is described a data-driven algorithm for the functionally correct spelling of MIDI pitch values in terms of Western musical notation. Input is in the form of MIDI fi...
Josh Stoddard, Christopher Raphael, Paul E. Utgoff
ICDAR
2003
IEEE
15 years 10 months ago
Comparison of Some Thresholding Algorithms for Text/Background Segmentation in Difficult Document Images
A number of techniques have previously been proposed for effective thresholding of document images. In this paper two new thresholding techniques are proposed and compared against...
Graham Leedham, Yan Chen, Kalyan Takru, Joie Hadi ...
ISCAS
2003
IEEE
119views Hardware» more  ISCAS 2003»
15 years 10 months ago
Simulated evolution algorithm for multiobjective VLSI netlist bi-partitioning
In this paper, the Simulated Evolution algorithm (SimE) is engineered to solve the optimization problem of multi-objective VLSI netlist bi-partitioning. The multi-objective versio...
Sadiq M. Sait, Aiman H. El-Maleh, Rush H. Al-Abuji
INFOCOM
1999
IEEE
15 years 9 months ago
CEDAR: a Core-Extraction Distributed Ad Hoc Routing Algorithm
Abstract--CEDAR is an algorithm for QoS routing in ad hoc network environments. It has three key components: (a) the establishment and maintenance of a self-organizing routing infr...
Prasun Sinha, Raghupathy Sivakumar, Vaduvur Bhargh...
ISCC
1999
IEEE
15 years 9 months ago
On Network Survivability Algorithms Based on Trellis Graph Transformations
Due to the wide range of services being supported, telecommunications networks are loaded with massive quantities of information. This stimulates extra concern for network surviva...
Soulla Louca, Andreas Pitsillides, George Samaras