Sciweavers

2470 search results - page 318 / 494
» Adaptive Peer Selection
Sort
View
SIGMOD
2002
ACM
129views Database» more  SIGMOD 2002»
14 years 9 months ago
Best-effort cache synchronization with source cooperation
In environments where exact synchronization between source data objects and cached copies is not achievable due to bandwidth or other resource constraints, stale (out-of-date) cop...
Chris Olston, Jennifer Widom
CTRSA
2010
Springer
257views Cryptology» more  CTRSA 2010»
14 years 4 months ago
Practical Key Recovery Attack against Secret-IV Edon-
Abstract. The SHA-3 competition has been organized by NIST to select a new hashing standard. Edon-R was one of the fastest candidates in the first round of the competition. In thi...
Gaëtan Leurent
3DPVT
2006
IEEE
175views Visualization» more  3DPVT 2006»
14 years 3 months ago
On 3D Retrieval from Photos
In this paper, we propose a method for 3D-model retrieval from one or more photos. This method provides an ”optimal” selection of 2D views to represent a 3D-model, and a proba...
Tarik Filali Ansary, Jean-Philippe Vandeborre, Moh...
GECCO
2009
Springer
121views Optimization» more  GECCO 2009»
14 years 2 months ago
Using memetic algorithms to improve portfolio performance in static and dynamic trading scenarios
The Portfolio Optimization problem consists of the selection of a group of assets to a long-term fund in order to minimize the risk and maximize the return of the investment. This...
Claus de Castro Aranha, Hitoshi Iba
GECCO
2006
Springer
218views Optimization» more  GECCO 2006»
14 years 1 months ago
A survey of mutation techniques in genetic programming
The importance of mutation varies across evolutionary computation domains including: genetic programming, evolution strategies, and genetic algorithms. In the genetic programming ...
Alan Piszcz, Terence Soule