Sciweavers

1717 search results - page 193 / 344
» On the analysis of the (1 1) memetic algorithm
Sort
View
PODS
1989
ACM
155views Database» more  PODS 1989»
15 years 1 months ago
Fractals for Secondary Key Retrieval
In this paper we propose the use of fractals and especially the Hilbert curve, in order to design good distance-preserving mappings. Such mappings improve the performance of secon...
Christos Faloutsos, Shari Roseman
AAAI
2008
15 years 13 days ago
Generating Application-Specific Benchmark Models for Complex Systems
Automated generators for synthetic models and data can play a crucial role in designing new algorithms/modelframeworks, given the sparsity of benchmark models for empirical analys...
Jun Wang, Gregory M. Provan
SADM
2008
165views more  SADM 2008»
14 years 9 months ago
Global Correlation Clustering Based on the Hough Transform
: In this article, we propose an efficient and effective method for finding arbitrarily oriented subspace clusters by mapping the data space to a parameter space defining the set o...
Elke Achtert, Christian Böhm, Jörn David...
INFOCOM
2010
IEEE
14 years 8 months ago
Delay-Based Network Utility Maximization
—It is well known that max-weight policies based on a queue backlog index can be used to stabilize stochastic networks, and that similar stability results hold if a delay index i...
Michael J. Neely
ICASSP
2011
IEEE
14 years 1 months ago
Temporal hysteresis model of time varying subjective video quality
Video quality assessment (QA) continues to be an important area of research due to the overwhelming number of applications where videos are delivered to humans. In particular, the...
Kalpana Seshadrinathan, Alan C. Bovik