Sciweavers

9359 search results - page 142 / 1872
» Generalization Algorithms for Second-Order Terms
Sort
View
DAC
2004
ACM
16 years 5 months ago
Proxy-based task partitioning of watermarking algorithms for reducing energy consumption in mobile devices
Digital watermarking is a process that embeds an imperceptible signature or watermark in a digital file containing audio, image, text or video data. The watermark is later used to...
Arun Kejariwal, Sumit Gupta, Alexandru Nicolau, Ni...
KDD
2005
ACM
142views Data Mining» more  KDD 2005»
16 years 4 months ago
Towards exploratory test instance specific algorithms for high dimensional classification
In an interactive classification application, a user may find it more valuable to develop a diagnostic decision support method which can reveal significant classification behavior...
Charu C. Aggarwal
TRIDENTCOM
2008
IEEE
15 years 10 months ago
A case study in testing a network security algorithm
Several difficulties arise when testing network security algorithms. First, using network data captured at a router does not guarantee that any instances of the security event of...
Carrie Gates
GECCO
2007
Springer
174views Optimization» more  GECCO 2007»
15 years 10 months ago
Investigating data-flow coverage of classes using evolutionary algorithms
It is not unusual for a software development organization to expend 40 percent of total project effort on testing, which can be a very laborious and time-consuming process. Thus, ...
Konstantinos Liaskos, Marc Roper, Murray Wood
ATAL
2005
Springer
15 years 9 months ago
An online POMDP algorithm for complex multiagent environments
In this paper, we present an online method for POMDPs, called RTBSS (Real-Time Belief Space Search), which is based on a look-ahead search to find the best action to execute at e...
Sébastien Paquet, Ludovic Tobin, Brahim Cha...