Sciweavers

3836 search results - page 278 / 768
» Optimizing the Use of High Performance Software Libraries
Sort
View
EUROMICRO
2000
IEEE
15 years 9 months ago
Tumor Recognition in Endoscopic Video Images Using Artificial Neural Network Architectures
This paper focuses on a scheme for automated tumor recognition using images acquired during endoscopic sessions. The proposed recognition system is based on multi-layer feed forwa...
S. A. Karkanis, Dimitrios K. Iakovidis, Dimitrios ...
GECCO
2005
Springer
186views Optimization» more  GECCO 2005»
15 years 10 months ago
Subproblem optimization by gene correlation with singular value decomposition
Several ways of using singular value decomposition (SVD), a linear algebra technique typically used for information retrieval, to decompose problems into subproblems are investiga...
Jacob G. Martin
GECCO
2010
Springer
173views Optimization» more  GECCO 2010»
15 years 5 months ago
Superstate identification for state machines using search-based clustering
State machines are a popular method of representing a syshigh level of abstraction that enables developers to gain an overview of the system they represent and quickly understand ...
Mathew Hall, Phil McMinn, Neil Walkinshaw
IEEEPACT
2009
IEEE
15 years 11 months ago
Automatic Tuning of Discrete Fourier Transforms Driven by Analytical Modeling
—Analytical models have been used to estimate optimal values for parameters such as tile sizes in the context of loop nests. However, important algorithms such as fast Fourier tr...
Basilio B. Fraguela, Yevgen Voronenko, Markus P&uu...
ICSE
2007
IEEE-ACM
16 years 4 months ago
Testing and Analysis of Access Control Policies
Policy testing and analysis are important techniques for high assurance of correct specification of access control policies. We propose a set of testing and analysis techniques fo...
Evan Martin