Sciweavers

3639 search results - page 606 / 728
» Provenance as Dependency Analysis
Sort
View
116
Voted
GECCO
2008
Springer
137views Optimization» more  GECCO 2008»
15 years 1 months ago
Rank based variation operators for genetic algorithms
We show how and why using genetic operators that are applied with probabilities that depend on the fitness rank of a genotype or phenotype offers a robust alternative to the Sim...
Jorge Cervantes, Christopher R. Stephens
81
Voted
WWW
2010
ACM
15 years 28 days ago
How useful are your comments?: analyzing and predicting youtube comments and comment ratings
An analysis of the social video sharing platform YouTube reveals a high amount of community feedback through comments for published videos as well as through meta ratings for thes...
Stefan Siersdorfer, Sergiu Chelaru, Wolfgang Nejdl...
119
Voted
HUC
2010
Springer
15 years 27 days ago
Tasking networked CCTV cameras and mobile phones to identify and localize multiple people
We present a method to identify and localize people by leveraging existing CCTV camera infrastructure along with inertial sensors (accelerometer and magnetometer) within each pers...
Thiago Teixeira, Deokwoo Jung, Andreas Savvides
ALGORITHMICA
2007
145views more  ALGORITHMICA 2007»
15 years 26 days ago
Counting Integer Points in Parametric Polytopes Using Barvinok's Rational Functions
Abstract Many compiler optimization techniques depend on the ability to calculate the number of elements that satisfy certain conditions. If these conditions can be represented by ...
Sven Verdoolaege, Rachid Seghir, Kristof Beyls, Vi...
109
Voted
CAD
2008
Springer
15 years 25 days ago
Detecting approximate symmetries of discrete point subsets
Detecting approximate symmetries of parts of a model is important when attempting to determine the geometric design intent of approximate boundary-representation (B-rep) solid mod...
Ming Li, Frank C. Langbein, Ralph R. Martin