Sciweavers

2421 search results - page 316 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
IPPS
2009
IEEE
15 years 11 months ago
Adaptative clustering Particle Swarm Optimization
—The performance of Particle Swarm Optimization (PSO) algorithms depends strongly upon the interaction among the particles. The existing communication topologies for PSO (e.g. st...
Salomão S. Madeiro, Carmelo J. A. Bastos Fi...
EMMCVPR
2001
Springer
15 years 9 months ago
Designing the Minimal Structure of Hidden Markov Model by Bisimulation
Hidden Markov Models (HMMs) are an useful and widely utilized approach to the modeling of data sequences. One of the problems related to this technique is finding the optimal stru...
Manuele Bicego, Agostino Dovier, Vittorio Murino
140
Voted
COMBINATORICS
2004
102views more  COMBINATORICS 2004»
15 years 4 months ago
Satisfiability and Computing van der Waerden Numbers
In this paper we bring together the areas of combinatorics and propositional satisfiability. Many combinatorial theorems establish, often constructively, the existence of positive...
Michael R. Dransfield, Lengning Liu, Victor W. Mar...
EUROMICRO
2009
IEEE
15 years 11 months ago
Bridging the Component-Based and Service-Oriented Worlds
Abstract—The component-based and service-oriented development have become commonly used techniques for building high quality, evolvable, large systems in a timely and affordable ...
Karel Masek, Petr Hnetynka, Tomás Bures
RULEML
2009
Springer
15 years 11 months ago
TomML: A Rule Language for Structured Data
Abstract. We present the Tom language that extends Java with the purpose of providing high level constructs inspired by the rewriting community. Tom bridges thus the gap between a ...
Horatiu Cirstea, Pierre-Etienne Moreau, Antoine Re...