Sciweavers

6393 search results - page 942 / 1279
» Randomized Algorithms on the Mesh
Sort
View
EVOW
2006
Springer
15 years 8 months ago
Continuous-Time Recurrent Neural Networks for Generative and Interactive Musical Performance
This paper describes an ongoing exploration into the use of Continuous-Time Recurrent Neural Networks (CTRNNs) as generative and interactive performance tools, and using Genetic Al...
Oliver Bown, Sebastian Lexer
FSE
2006
Springer
109views Cryptology» more  FSE 2006»
15 years 8 months ago
Cryptanalysis of the Stream Cipher DECIM
DECIM is a hardware oriented stream cipher with an 80-bit key and a 64-bit IV. In this paper, we point out two serious flaws in DECIM. One flaw is in the initialization of DECIM. I...
Hongjun Wu, Bart Preneel
GECCO
2006
Springer
146views Optimization» more  GECCO 2006»
15 years 8 months ago
The dispersion metric and the CMA evolution strategy
An algorithm independent metric is introduced that measures the dispersion of a uniform random sample drawn from the top ranked percentiles of the search space. A low dispersion f...
Monte Lunacek, Darrell Whitley
ICMCS
2000
IEEE
122views Multimedia» more  ICMCS 2000»
15 years 8 months ago
Optimal Streaming of Layer-Encoded Multimedia Presentations
In the context of communication networks with no QoS guarantees, we describe the problem of streaming layer encoded multimedia presentation data as a two-phase decision problem. W...
David A. Turner, Keith W. Ross
175
Voted
IJCNN
2000
IEEE
15 years 8 months ago
A Training Method with Small Computation for Classification
A training data selection method for multi-class data is proposed. This method can be used for multilayer neural networks (MLNN). The MLNN can be applied to pattern classification...
Kazuyuki Hara, Kenji Nakayama