Sciweavers

1687 search results - page 76 / 338
» Which pointer analysis should I use
Sort
View
114
Voted
GECCO
2007
Springer
160views Optimization» more  GECCO 2007»
15 years 10 months ago
An analysis of constructive crossover and selection pressure in genetic programming
A common problem in genetic programming search algorithms is destructive crossover in which the offspring of good parents generally has worse performance than the parents. Design...
Huayang Xie, Mengjie Zhang, Peter Andreae
125
Voted
HIS
2008
15 years 5 months ago
Artificial Data Sets Based on Knowledge Generators: Analysis of Learning Algorithms Efficiency
This paper proposes a methodology to generate artificial data sets to evaluate the behavior of machine learning techniques. The methodology relies in the definition of a domain an...
Joaquin Rios-Boutin, Albert Orriols-Puig, Josep Ma...
142
Voted
DAS
2010
Springer
15 years 8 months ago
Binarization of historical document images using the local maximum and minimum
This paper presents a new document image binarization technique that segments the text from badly degraded historical document images. The proposed technique makes use of the imag...
Bolan Su, Shijian Lu, Chew Lim Tan
113
Voted
PPDP
2009
Springer
15 years 10 months ago
Path-sensitive region analysis for mercury programs
Dividing the heap memory of programs into regions is the starting point of region-based memory management. In our existing work of enabling region-based memory management for Merc...
Quan Phan, Gerda Janssens
159
Voted
TOSEM
2010
168views more  TOSEM 2010»
14 years 10 months ago
Analysis and applications of timed service protocols
Web services are increasingly gaining acceptance as a framework for facilitating application-to-application interactions within and across enterprises. It is commonly accepted tha...
Julien Ponge, Boualem Benatallah, Fabio Casati, Fa...