Sciweavers

1486 search results - page 118 / 298
» Firewall Rules Analysis
Sort
View
ICIP
2005
IEEE
15 years 9 months ago
View independent face recognition based on kernel principal component analysis of local parts
This paper presents a view independent face recognition method based on kernel principal component analysis (KPCA) of local parts. View changes induce large variation in feature s...
Koji Hotta
IJCNLP
2005
Springer
15 years 9 months ago
A Lexicon-Constrained Character Model for Chinese Morphological Analysis
Abstract. This paper proposes a lexicon-constrained character model that combines both word and character features to solve complicated issues in Chinese morphological analysis. A ...
Yao Meng, Hao Yu, Fumihito Nishino
DAC
2003
ACM
15 years 9 months ago
Performance trade-off analysis of analog circuits by normal-boundary intersection
We present a new technique to examine the trade-off regions of a circuit where its competing performances become “simultaneously optimal”, i.e. Pareto optimal. It is based on ...
Guido Stehr, Helmut E. Graeb, Kurt Antreich
ICALP
2003
Springer
15 years 9 months ago
Analysis of a Simple Evolutionary Algorithm for Minimization in Euclidean Spaces
Although evolutionary algorithms (EAs) are widely used in practical optimization, their theoretical analysis is still in its infancy. Up to now results on the (expected) runtime ar...
Jens Jägersküpper
117
Voted
RTA
2010
Springer
15 years 8 months ago
A Rewriting Logic Semantics Approach to Modular Program Analysis
The K framework, based on rewriting logic semantics, provides a powerful logic for defining the semantics of programming languages. While most work in this area has focused on de...
Mark Hills, Grigore Rosu