Sciweavers

4536 search results - page 783 / 908
» Contention-Sensitive Data Structures and Algorithms
Sort
View
GECCO
2006
Springer
167views Optimization» more  GECCO 2006»
14 years 2 months ago
Estimating the destructiveness of crossover on binary tree representations
In some cases, evolutionary algorithms represent individuals as typical binary trees with n leaves and n-1 internal nodes. When designing a crossover operator for a particular rep...
Luke Sheneman, James A. Foster
CIKM
2009
Springer
14 years 1 months ago
Effective, design-independent XML keyword search
Keyword search techniques that take advantage of XML structure make it very easy for ordinary users to query XML databases, but current approaches to processing these queries rely...
Arash Termehchy, Marianne Winslett
AMFG
2005
IEEE
211views Biometrics» more  AMFG 2005»
14 years 10 days ago
Non-rigid Face Modelling Using Shape Priors
Non-rigid 3D shape recovery is an inherently ambiguous problem. Given a specific rigid motion, different non-rigid shapes can be found that fit the measurements. To solve this am...
Alessio Del Bue, Xavier Lladó, Lourdes de A...
DSN
2008
IEEE
14 years 4 days ago
Reliability of flat XOR-based erasure codes on heterogeneous devices
XOR-based erasure codes are a computationallyefficient means of generating redundancy in storage systems. Some such erasure codes provide irregular fault tolerance: some subsets o...
Kevin M. Greenan, Ethan L. Miller, Jay J. Wylie
MEDIAFORENSICS
2010
13 years 11 months ago
Managing a large database of camera fingerprints
Sensor fingerprint is a unique noise-like pattern caused by slightly varying pixel dimensions and inhomogeneity of the silicon wafer from which the sensor is made. The fingerprint...
Miroslav Goljan, Jessica J. Fridrich, Tomás...