Sciweavers

1110 search results - page 192 / 222
» Clustering with the Connectivity Kernel
Sort
View
ATAL
2004
Springer
14 years 1 months ago
Agents Swarming in Semantic Spaces to Corroborate Hypotheses
To anticipate and prevent acts of terrorism, Indications and Warnings analysts try to connect clues gleaned from massive quantities of complex data. Multi-agent approaches to supp...
Peter Weinstein, H. Van Dyke Parunak, Paul Chiusan...
GECCO
2004
Springer
14 years 1 months ago
Real-Coded Bayesian Optimization Algorithm: Bringing the Strength of BOA into the Continuous World
This paper describes a continuous estimation of distribution algorithm (EDA) to solve decomposable, real-valued optimization problems quickly, accurately, and reliably. This is the...
Chang Wook Ahn, Rudrapatna S. Ramakrishna, David E...
CCGRID
2003
IEEE
14 years 27 days ago
An Exposed Approach to Reliable Multicast in Heterogeneous Logistical Networks
An exposed approach in computer service architecture is one that offers client software a primitive service whose semantics are closely based on the underlying physical infrastruc...
Micah Beck, Ying Ding 0002, Erika Fuentes, Sharmil...
SBACPAD
2003
IEEE
180views Hardware» more  SBACPAD 2003»
14 years 26 days ago
New Parallel Algorithms for Frequent Itemset Mining in Very Large Databases
Frequent itemset mining is a classic problem in data mining. It is a non-supervised process which concerns in finding frequent patterns (or itemsets) hidden in large volumes of d...
Adriano Veloso, Wagner Meira Jr., Srinivasan Parth...
MM
2003
ACM
116views Multimedia» more  MM 2003»
14 years 26 days ago
Photo2Video
To exploit rich content embedded in a single photograph, a system named Photo2Video was developed to automatically convert a photographic series into a video by simulating camera ...
Xian-Sheng Hua, Lie Lu, HongJiang Zhang