Sciweavers

2006 search results - page 103 / 402
» Heuristic Security-Testing Methods
Sort
View
NN
2006
Springer
108views Neural Networks» more  NN 2006»
15 years 18 days ago
Performance analysis of LVQ algorithms: A statistical physics approach
Learning vector quantization (LVQ) constitutes a powerful and intuitive method for adaptive nearest prototype classification. However, original LVQ has been introduced based on he...
Anarta Ghosh, Michael Biehl, Barbara Hammer
98
Voted
AES
2007
Springer
109views Cryptology» more  AES 2007»
15 years 15 days ago
Compatible coarsening in the multigraph algorithm
We present some heuristics incorporating the philosophy of compatible relaxation into an existing algebraic multigrid method, the so-called multigraph solver of Bank and Smith [1]...
Randolph E. Bank
TR
2010
131views Hardware» more  TR 2010»
14 years 7 months ago
A Memetic Algorithm for Multi-Level Redundancy Allocation
Redundancy allocation problems (RAPs) have attracted much attention for the past thirty years due to its wide applications in improving the reliability of various engineering syste...
Zai Wang, Ke Tang, Xin Yao
92
Voted
ICASSP
2011
IEEE
14 years 4 months ago
Phase-sensitive speech enhancement for cochlear implant processing
In this paper, we present a new approach to enhance noisy speech based on an environmental model incorporating the phase between noise and clean speech (often called phasesensitiv...
Pourya S. Jafari, Hou-Yong Kang, Xiaosong Wang, Qi...
160
Voted
FOGA
2011
14 years 4 months ago
Approximating the distribution of fitness over hamming regions
The distribution of fitness values across a set of states sharply influences the dynamics of evolutionary processes and heuristic search in combinatorial optimization. In this p...
Andrew M. Sutton, Darrell Whitley, Adele E. Howe