Sciweavers

983 search results - page 111 / 197
» Circuit Complexity and Multiplicative Complexity of Boolean ...
Sort
View
ASC
2008
13 years 10 months ago
Development of scheduling strategies with Genetic Fuzzy systems
This paper presents a methodology for automatically generating online scheduling strategies for a complex objective defined by a machine provider. To this end, we assume independe...
Carsten Franke, Frank Hoffmann, Joachim Lepping, U...
DCC
2010
IEEE
13 years 10 months ago
The cost of false alarms in Hellman and rainbow tradeoffs
Abstract Cryptanalytic time memory tradeoff algorithms are generic one-way function inversion techniques that utilize pre-computation. Even though the online time complexity is kno...
Jin Hong
GECCO
2009
Springer
199views Optimization» more  GECCO 2009»
14 years 2 months ago
Using behavioral exploration objectives to solve deceptive problems in neuro-evolution
Encouraging exploration, typically by preserving the diversity within the population, is one of the most common method to improve the behavior of evolutionary algorithms with dece...
Jean-Baptiste Mouret, Stéphane Doncieux
GLVLSI
2009
IEEE
142views VLSI» more  GLVLSI 2009»
14 years 4 months ago
Hardware-accelerated gradient noise for graphics
A synthetic noise function is a key component of most computer graphics rendering systems. This pseudo-random noise function is used to create a wide variety of natural looking te...
Josef B. Spjut, Andrew E. Kensler, Erik Brunvand
ICDM
2007
IEEE
301views Data Mining» more  ICDM 2007»
14 years 2 months ago
Stream Event Detection: A Unified Framework for Mining Outlier, Change and Burst Simultaneously over Data Stream
Event detection is one of the most important issues of event processing system, especially Complex Event Processing (CEP). Outlier event, change event and burst event are three ty...
Zhijian Yuan, Kai Du, Yan Jia, Jiajia Miao