Sciweavers

1466 search results - page 237 / 294
» Completeness of the Authentication Tests
Sort
View
MEMETIC
2010
311views more  MEMETIC 2010»
13 years 2 months ago
Iterated local search with Powell's method: a memetic algorithm for continuous global optimization
In combinatorial solution spaces Iterated Local Search (ILS) turns out to be exceptionally successful. The question arises: is ILS also capable of improving the optimization proces...
Oliver Kramer
PRL
2010
209views more  PRL 2010»
13 years 2 months ago
Efficient update of the covariance matrix inverse in iterated linear discriminant analysis
For fast classification under real-time constraints, as required in many imagebased pattern recognition applications, linear discriminant functions are a good choice. Linear discr...
Jan Salmen, Marc Schlipsing, Christian Igel
TASLP
2010
109views more  TASLP 2010»
13 years 2 months ago
Multipitch Estimation of Piano Sounds Using a New Probabilistic Spectral Smoothness Principle
Abstract--A new method for the estimation of multiple concurrent pitches in piano recordings is presented. It addresses the issue of overlapping overtones by modeling the spectral ...
Valentin Emiya, Roland Badeau, Bertrand David
CORR
2011
Springer
197views Education» more  CORR 2011»
12 years 11 months ago
Securing The Kernel via Static Binary Rewriting and Program Shepherding
Recent Microsoft security bulletins show that kernel vulnerabilities are becoming more and more important security threats. Despite the pretty extensive security mitigations many ...
Piotr Bania
EUROSYS
2011
ACM
12 years 11 months ago
Refuse to crash with Re-FUSE
We introduce Re-FUSE, a framework that provides support for restartable user-level file systems. Re-FUSE monitors the user-level file-system and on a crash transparently restart...
Swaminathan Sundararaman, Laxman Visampalli, Andre...