Sciweavers

2088 search results - page 307 / 418
» The Probabilistic Method
Sort
View
91
Voted
GECCO
2007
Springer
215views Optimization» more  GECCO 2007»
15 years 7 months ago
Addressing sampling errors and diversity loss in UMDA
Estimation of distribution algorithms replace the typical crossover and mutation operators by constructing a probabilistic model and generating offspring according to this model....
Jürgen Branke, Clemens Lode, Jonathan L. Shap...
99
Voted
GLVLSI
2006
IEEE
113views VLSI» more  GLVLSI 2006»
15 years 6 months ago
Statistical gate delay calculation with crosstalk alignment consideration
We study gate delay variation caused by crosstalk aggressor alignment, i.e., difference of signal arrival times in coupled neighboring interconnects. This effect is as significan...
Andrew B. Kahng, Bao Liu, Xu Xu
121
Voted
PAKDD
2005
ACM
160views Data Mining» more  PAKDD 2005»
15 years 6 months ago
Improving Mining Quality by Exploiting Data Dependency
The usefulness of the results produced by data mining methods can be critically impaired by several factors such as (1) low quality of data, including errors due to contamination, ...
Fang Chu, Yizhou Wang, Carlo Zaniolo, Douglas Stot...
ICADL
2003
Springer
147views Education» more  ICADL 2003»
15 years 6 months ago
Effective Image Annotation for Search Using Multi-level Semantics
There is an increasing need of development of automatic tools to annotate images for effective image searching in digital libraries. In this paper, we present a novel probabilistic...
Pu-Jen Cheng, Lee-Feng Chien
114
Voted
ICALP
2001
Springer
15 years 5 months ago
Secure Games with Polynomial Expressions
Abstract. We present the first private information retrieval (PIR) scheme which is both, deterministically correct and has poly-logarithmic communication complexity. Our PIR proto...
Aggelos Kiayias, Moti Yung