Sciweavers

106 search results - page 8 / 22
» The power of indirect ties
Sort
View
GECCO
2005
Springer
232views Optimization» more  GECCO 2005»
15 years 5 months ago
Factorial representations to generate arbitrary search distributions
A powerful approach to search is to try to learn a distribution of good solutions (in particular of the dependencies between their variables) and use this distribution as a basis ...
Marc Toussaint
ENTCS
2006
145views more  ENTCS 2006»
14 years 11 months ago
A Classification of Time and/or Probability Dependent Security Properties
In multilevel systems it is important to avoid unwanted indirect information flow from higher levels to lower levels, namely the so called covert channels. Initial studnformation ...
Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo...
RECOMB
2003
Springer
15 years 11 months ago
Physical network models and multi-source data integration
We develop a new framework for inferring models of transcriptional regulation. The models in this approach, which we call physical models, are constructed on the basis of verifiab...
Chen-Hsiang Yeang, Tommi Jaakkola
SPIESR
2004
143views Database» more  SPIESR 2004»
15 years 25 days ago
An entropy-based objective evaluation method for image segmentation
Accurate image segmentation is important for many image, video and computer vision applications. Over the last few decades, many image segmentation methods have been proposed. How...
Hui Zhang, Jason E. Fritts, Sally A. Goldman
GLVLSI
2011
IEEE
351views VLSI» more  GLVLSI 2011»
14 years 3 months ago
Design of low-power multiple constant multiplications using low-complexity minimum depth operations
Existing optimization algorithms for the multiplierless realization of multiple constant multiplications (MCM) typically target the minimization of the number of addition and subt...
Levent Aksoy, Eduardo Costa, Paulo F. Flores, Jos&...