Sciweavers

5580 search results - page 806 / 1116
» Randomized priority algorithms
Sort
View
132
Voted
ACCV
2009
Springer
15 years 10 months ago
Visual Saliency Based Object Tracking
Abstract. This paper presents a novel method of on-line object tracking with the static and motion saliency features extracted from the video frames locally, regionally and globall...
Geng Zhang, Zejian Yuan, Nanning Zheng, Xingdong S...
116
Voted
GECCO
2009
Springer
141views Optimization» more  GECCO 2009»
15 years 10 months ago
Distributed hyper-heuristics for real parameter optimization
Hyper-heuristics (HHs) are heuristics that work with an arbitrary set of search operators or algorithms and combine these algorithms adaptively to achieve a better performance tha...
Marco Biazzini, Balázs Bánhelyi, Alb...
GECCO
2009
Springer
191views Optimization» more  GECCO 2009»
15 years 10 months ago
Evolvable malware
The concept of artificial evolution has been applied to numerous real world applications in different domains. In this paper, we use this concept in the domain of virology to ev...
Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Mu...
NETCOOP
2009
Springer
15 years 10 months ago
Control of Multipath TCP and Optimization of Multipath Routing in the Internet
There are moves in the Internet architecture community to add multipath capabilities to TCP, so that end-systems will be able to shift their traffic away from congested parts of th...
Damon Wischik, Mark Handley, Costin Raiciu
WEA
2010
Springer
397views Algorithms» more  WEA 2010»
15 years 9 months ago
A New Combinational Logic Minimization Technique with Applications to Cryptology
Abstract. A new technique for combinational logic optimization is described. The technique is a two-step process. In the first step, the nonlinearity of a circuit – as measured ...
Joan Boyar, René Peralta