Sciweavers

2237 search results - page 358 / 448
» On the Security of Random Sources
Sort
View
CEC
2010
IEEE
14 years 10 months ago
Cooperative Co-evolution with delta grouping for large scale non-separable function optimization
— Many evolutionary algorithms have been proposed for large scale optimization. Parameter interaction in nonseparable problems is a major source of performance loss specially on ...
Mohammad Nabi Omidvar, Xiaodong Li, Xin Yao
GRC
2010
IEEE
14 years 10 months ago
Geo-clustering of Images with Missing GeoTags
—Images with GPS coordinates are a rich source of information about a geographic location. Innovative user services and applications are being built using geotagged images taken ...
Vishwakarma Singh, Sharath Venkatesha, Ambuj K. Si...
HPDC
2008
IEEE
14 years 10 months ago
Code coverage, performance approximation and automatic recognition of idioms in scientific applications
Basic data flow patterns which we call idioms, such as stream, transpose, reduction, random access and stencil, are common in scientific numerical applications. We hypothesize tha...
Jiahua He, Allan Snavely, Rob F. Van der Wijngaart...
BMCBI
2008
99views more  BMCBI 2008»
14 years 10 months ago
NestedMICA as an ab initio protein motif discovery tool
Background: Discovering overrepresented patterns in amino acid sequences is an important step in protein functional element identification. We adapted and extended NestedMICA, an ...
Mutlu Dogruel, Thomas A. Down, Tim J. P. Hubbard
CORR
2008
Springer
108views Education» more  CORR 2008»
14 years 10 months ago
On Maximizing Coverage in Gaussian Relay Networks
Results for Gaussian relay channels typically focus on maximizing transmission rates for given locations of the source, relay and destination. We introduce an alternative perspecti...
Vaneet Aggarwal, Amir Bennatan, A. Robert Calderba...