This paper reports briefly on the development of a new approach to evolutionary computation, called the Learnable Evolution Model or LEM. In contrast to conventional Darwinian-typ...
Ryszard S. Michalski, Guido Cervone, Kenneth A. Ka...
The historical context surrounding the birth of the DARPA High Productivity Computing Systems (HPCS) program is important for understanding why federal government agencies launche...
Jack Dongarra, Robert Graybill, William Harrod, Ro...
Conventional cryptography uses encryption key, which are long bit strings and are very hard to memorize such a long random numbers. Also it can be easily attacked by using the brut...
Abdullah Sharaf Alghamdi, Hanif Ullah, Maqsood Mah...
Abstract—Power management is an essential component of any electrical system, and nowadays a limiting factor in the miniaturization of portable electronic devices. Not only are t...
E. O. Torres, Min Chen, H. Pooya Forghani-zadeh, V...
Over the last decade, the availability of public image repositories and recognition benchmarks has enabled rapid progress in visual object category and instance detection. Today we...
Kevin Lai, Liefeng Bo, Xiaofeng Ren and Dieter Fox