Sciweavers

1717 search results - page 248 / 344
» On the analysis of the (1 1) memetic algorithm
Sort
View
GECCO
2005
Springer
15 years 3 months ago
Theme preservation and the evolution of representation
The identification of mechanisms by which constraints on phenotypic variability are tuned in nature, and the implementation of these mechanisms in Evolutionary Algorithms (EAs) ca...
Keki M. Burjorjee, Jordan B. Pollack
EMSOFT
2008
Springer
14 years 11 months ago
Portioned EDF-based scheduling on multiprocessors
This paper presents an EDF-based algorithm, called Earliest Deadline Deferrable Portion (EDDP), for efficient scheduling of recurrent real-time tasks on multiprocessor systems. Th...
Shinpei Kato, Nobuyuki Yamasaki
BMCBI
2010
104views more  BMCBI 2010»
14 years 10 months ago
FragViz: visualization of fragmented networks
Background: Researchers in systems biology use network visualization to summarize the results of their analysis. Such networks often include unconnected components, which popular ...
Miha Stajdohar, Minca Mramor, Blaz Zupan, Janez De...
CVPR
2007
IEEE
15 years 12 months ago
Detector Ensemble
Component-based detection methods have demonstrated their promise by integrating a set of part-detectors to deal with large appearance variations of the target. However, an essent...
Shengyang Dai, Ming Yang, Ying Wu, Aggelos K. Kats...
ICDE
2008
IEEE
178views Database» more  ICDE 2008»
15 years 11 months ago
On the Optimal Selection of k in the k-Anonymity Problem
When disseminating data involving human subjects, researchers have to weigh in the requirements of privacy of the individuals involved in the data. A model widely used for enhancin...
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...