Sciweavers

672 search results - page 49 / 135
» An assessment of tag presentation techniques
Sort
View
ENTCS
2008
118views more  ENTCS 2008»
13 years 6 months ago
Shared Hash Tables in Parallel Model Checking
In light of recent shift towards shared-memory systems in parallel explicit model checking, we explore relative advantages and disadvantages of shared versus private hash tables. ...
Jiri Barnat, Petr Rockai
ICPR
2004
IEEE
14 years 8 months ago
Entropy-Based Measures for Clustering and SOM Topology Preservation Applied to Content-Based Image Indexing and Retrieval
Content-based image retrieval (CBIR) addresses the problem of finding images relevant to the users' information needs, based principally on low-level visual features for whic...
Markus Koskela, Jorma Laaksonen, Erkki Oja
ICSE
2003
IEEE-ACM
14 years 7 months ago
Sound Methods and Effective Tools for Engineering Modeling and Analysis
Modeling and analysis is indispensable in engineering. To be safe and effective, a modeling method requires a language with a validated semantics; feature-rich, easy-to-use, depen...
David Coppit, Kevin J. Sullivan
GECCO
2005
Springer
128views Optimization» more  GECCO 2005»
14 years 1 months ago
Hybrid multiobjective genetic algorithm with a new adaptive local search process
This paper is concerned with a specific brand of evolutionary algorithms: Memetic algorithms. A new local search technique with an adaptive neighborhood setting process is introdu...
Salem F. Adra, Ian Griffin, Peter J. Fleming
ECBS
2007
IEEE
145views Hardware» more  ECBS 2007»
13 years 11 months ago
Automatic Verification and Performance Analysis of Time-Constrained SysML Activity Diagrams
We present in this paper a new approach for the automatic verification and performance analysis of SysML activity diagrams. Since timeliness is important in the design and analysi...
Yosr Jarraya, Andrei Soeanu, Mourad Debbabi, Fawzi...