Sciweavers

639 search results - page 106 / 128
» Comparative analysis of genetic algorithm implementations
Sort
View
MM
2004
ACM
277views Multimedia» more  MM 2004»
14 years 29 days ago
Avatar-mediated face tracking and lip reading for human computer interaction
Advanced human computer interaction requires automatic reading of human face in order to make the computer interact with human in the same way as human-to-human communication. We ...
Xiaozhou Wei, Lijun Yin, Zhiwei Zhu, Qiang Ji
CVPR
2008
IEEE
14 years 9 months ago
Robust tensor factorization using R1 norm
Over the years, many tensor based algorithms, e.g. two dimensional principle component analysis (2DPCA), two dimensional singular value decomposition (2DSVD), high order SVD, have...
Heng Huang, Chris H. Q. Ding
CORR
2011
Springer
124views Education» more  CORR 2011»
13 years 2 months ago
Parallel Recursive State Compression for Free
This paper focuses on reducing memory usage in enumerative model checking, while maintaining the multi-core scalability obtained in earlier work. We present a multi-core tree-based...
Alfons Laarman, Jaco van de Pol, Michael Weber 000...
BMCBI
2008
119views more  BMCBI 2008»
13 years 7 months ago
Snagger: A user-friendly program for incorporating additional information for tagSNP selection
Background: There has been considerable effort focused on developing efficient programs for tagging single-nucleotide polymorphisms (SNPs). Many of these programs do not account f...
Christopher K. Edlund, Won H. Lee, Dalin Li, David...
IPCCC
2006
IEEE
14 years 1 months ago
Connectionless port scan detection on the backbone
Considerable research has been done on detecting and blocking portscan activities that are typically conducted by infected hosts to discover other vulnerable hosts. However, the f...
Avinash Sridharan, Tao Ye, Supratik Bhattacharyya