Sciweavers

2824 search results - page 466 / 565
» Text Generation from Keywords
Sort
View
DAMON
2006
Springer
15 years 7 months ago
Using secure coprocessors for privacy preserving collaborative data mining and analysis
Secure coprocessors have traditionally been used as a keystone of a security subsystem, eliminating the need to protect the rest of the subsystem with physical security measures. ...
Bishwaranjan Bhattacharjee, Naoki Abe, Kenneth Gol...
GECCO
2006
Springer
218views Optimization» more  GECCO 2006»
15 years 7 months ago
Genetic programming with primitive recursion
When Genetic Programming is used to evolve arithmetic functions it often operates by composing them from a fixed collection of elementary operators and applying them to parameters...
Stefan Kahrs
GECCO
2006
Springer
138views Optimization» more  GECCO 2006»
15 years 7 months ago
Does overfitting affect performance in estimation of distribution algorithms
Estimation of Distribution Algorithms (EDAs) are a class of evolutionary algorithms that use machine learning techniques to solve optimization problems. Machine learning is used t...
Hao Wu, Jonathan L. Shapiro
GECCO
2006
Springer
206views Optimization» more  GECCO 2006»
15 years 7 months ago
A dynamically constrained genetic algorithm for hardware-software partitioning
In this article, we describe the application of an enhanced genetic algorithm to the problem of hardware-software codesign. Starting from a source code written in a high-level lan...
Pierre-André Mudry, Guillaume Zufferey, Gia...
AFRIGRAPH
2001
ACM
15 years 7 months ago
Realistic visualisation of the Pompeii frescoes
Three dimensional computer reconstruction provides us with a means of visualising past environments, allowing us a glimpse of the past that might otherwise be difficult to appreci...
Kate Devlin, Alan Chalmers