Sciweavers

256 search results - page 20 / 52
» Comparison of Heuristic and Optimal Subcarrier Assignment Al...
Sort
View
SAC
2010
ACM
14 years 3 months ago
A simple role mining algorithm
Complex organizations need to establish access control policies in order to manage access to restricted resources. Role Based Access Control paradigm has been introduced in ’90 ...
Carlo Blundo, Stelvio Cimato
SDM
2003
SIAM
125views Data Mining» more  SDM 2003»
13 years 10 months ago
Scalable, Balanced Model-based Clustering
This paper presents a general framework for adapting any generative (model-based) clustering algorithm to provide balanced solutions, i.e., clusters of comparable sizes. Partition...
Shi Zhong, Joydeep Ghosh
IVC
2007
114views more  IVC 2007»
13 years 8 months ago
Evaluation of a convex relaxation to a quadratic assignment matching approach for relational object views
We introduce a convex relaxation approach for the quadratic assignment problem to the field of computer vision. Due to convexity, a favourable property of this approach is the ab...
Christian Schellewald, Stefan Roth, Christoph Schn...
GECCO
2004
Springer
104views Optimization» more  GECCO 2004»
14 years 2 months ago
SWAF: Swarm Algorithm Framework for Numerical Optimization
A swarm algorithm framework (SWAF), realized by agent-based modeling, is presented to solve numerical optimization problems. Each agent is a bare bones cognitive architecture, whic...
Xiao-Feng Xie, Wenjun Zhang
ISPD
1997
ACM
186views Hardware» more  ISPD 1997»
14 years 26 days ago
EWA: exact wiring-sizing algorithm
The wire sizing problem under inequality Elmore delay constraints is known to be posynomial, hence convex under an exponential variable-transformation. There are formal methods fo...
Rony Kay, Gennady Bucheuv, Lawrence T. Pileggi