Sciweavers

919 search results - page 45 / 184
» Improved analysis methods for crossover-based algorithms
Sort
View
GLVLSI
2008
IEEE
140views VLSI» more  GLVLSI 2008»
15 years 8 months ago
A table-based method for single-pass cache optimization
Due to the large contribution of the memory subsystem to total system power, the memory subsystem is highly amenable to customization for reduced power/energy and/or improved perf...
Pablo Viana, Ann Gordon-Ross, Edna Barros, Frank V...
SDM
2003
SIAM
110views Data Mining» more  SDM 2003»
15 years 3 months ago
Mixture Models and Frequent Sets: Combining Global and Local Methods for 0-1 Data
We study the interaction between global and local techniques in data mining. Specifically, we study the collections of frequent sets in clusters produced by a probabilistic clust...
Jaakko Hollmén, Jouni K. Seppänen, Hei...
IROS
2008
IEEE
108views Robotics» more  IROS 2008»
15 years 8 months ago
Synchronous imitation control for biped robot based on wearable human motion analysis system
— To achieve accurate and efficient interaction with humans, robot training is indispensable to make robot cooperate with different host. We are focusing on development of a huma...
Tao Liu, H. Utsunomiya, Yoshio Inoue, Kyoko Shibat...
IJNSEC
2006
131views more  IJNSEC 2006»
15 years 1 months ago
A Frobenius Map Approach for an Efficient and Secure Multiplication on Koblitz
The most efficient technique for protecting the using Frobenius algorithms for scalar multiplication on Koblitz curves against the Side Channel Attacks seems to be the multiplier ...
Mustapha Hedabou
ADC
2007
Springer
145views Database» more  ADC 2007»
15 years 8 months ago
The Privacy of k-NN Retrieval for Horizontal Partitioned Data -- New Methods and Applications
Recently, privacy issues have become important in clustering analysis, especially when data is horizontally partitioned over several parties. Associative queries are the core retr...
Artak Amirbekyan, Vladimir Estivill-Castro