Sciweavers

4816 search results - page 148 / 964
» Performance analysis of the AntNet algorithm
Sort
View
FDTC
2007
Springer
124views Cryptology» more  FDTC 2007»
15 years 11 months ago
Countermeasures against Branch Target Buffer Attacks
Branch Prediction Analysis has been recently proposed as an attack method to extract the key from software implementations of the RSA public key cryptographic algorithm. In this p...
Giovanni Agosta, Luca Breveglieri, Gerardo Pelosi,...
PRL
2010
188views more  PRL 2010»
14 years 12 months ago
A fast divisive clustering algorithm using an improved discrete particle swarm optimizer
As an important technique for data analysis, clustering has been employed in many applications such as image segmentation, document clustering and vector quantization. Divisive cl...
Liang Feng, Ming-Hui Qiu, Yu-Xuan Wang, Qiao-Liang...
MICCAI
2002
Springer
16 years 6 months ago
Validation of Image Segmentation and Expert Quality with an Expectation-Maximization Algorithm
Characterizing the performance of image segmentation approaches has been a persistent challenge. Performance analysis is important since segmentation algorithms often have limited ...
Simon K. Warfield, Kelly H. Zou, William M. Wells ...
MOBIHOC
2008
ACM
16 years 4 months ago
Construction algorithms for k-connected m-dominating sets in wireless sensor networks
A Connected Dominating Set (CDS) working as a virtual backbone is an effective way to decrease the overhead of routing in a wireless sensor network. Furthermore, a kConnected m-Do...
Yiwei Wu, Yingshu Li
150
Voted
GECCO
2005
Springer
163views Optimization» more  GECCO 2005»
15 years 10 months ago
An artificial immune system algorithm for CDMA multiuser detection over multi-path channels
Based on the Antibody Clonal Selection Theory of immunology, we put forward a novel clonal selection algorithm for multiuser detection in Code-division Multiple-access Systems. By...
Maoguo Gong, Ling Wang, Licheng Jiao, Haifeng Du