Sciweavers

256 search results - page 20 / 52
» Comparison of Heuristic and Optimal Subcarrier Assignment Al...
Sort
View
126
Voted
SAC
2010
ACM
15 years 10 months ago
A simple role mining algorithm
Complex organizations need to establish access control policies in order to manage access to restricted resources. Role Based Access Control paradigm has been introduced in ’90 ...
Carlo Blundo, Stelvio Cimato
119
Voted
SDM
2003
SIAM
125views Data Mining» more  SDM 2003»
15 years 5 months ago
Scalable, Balanced Model-based Clustering
This paper presents a general framework for adapting any generative (model-based) clustering algorithm to provide balanced solutions, i.e., clusters of comparable sizes. Partition...
Shi Zhong, Joydeep Ghosh
120
Voted
IVC
2007
114views more  IVC 2007»
15 years 3 months ago
Evaluation of a convex relaxation to a quadratic assignment matching approach for relational object views
We introduce a convex relaxation approach for the quadratic assignment problem to the field of computer vision. Due to convexity, a favourable property of this approach is the ab...
Christian Schellewald, Stefan Roth, Christoph Schn...
124
Voted
GECCO
2004
Springer
104views Optimization» more  GECCO 2004»
15 years 9 months ago
SWAF: Swarm Algorithm Framework for Numerical Optimization
A swarm algorithm framework (SWAF), realized by agent-based modeling, is presented to solve numerical optimization problems. Each agent is a bare bones cognitive architecture, whic...
Xiao-Feng Xie, Wenjun Zhang
168
Voted
ISPD
1997
ACM
186views Hardware» more  ISPD 1997»
15 years 7 months ago
EWA: exact wiring-sizing algorithm
The wire sizing problem under inequality Elmore delay constraints is known to be posynomial, hence convex under an exponential variable-transformation. There are formal methods fo...
Rony Kay, Gennady Bucheuv, Lawrence T. Pileggi