Sciweavers

1972 search results - page 364 / 395
» Evolutionary algorithms and dynamic programming
Sort
View
95
Voted
SP
2008
IEEE
100views Security Privacy» more  SP 2008»
15 years 9 months ago
Towards Practical Privacy for Genomic Computation
Many basic tasks in computational biology involve operations on individual DNA and protein sequences. These sequences, even when anonymized, are vulnerable to re-identification a...
Somesh Jha, Louis Kruger, Vitaly Shmatikov
102
Voted
ATAL
2007
Springer
15 years 8 months ago
A Q-decomposition and bounded RTDP approach to resource allocation
This paper contributes to solve effectively stochastic resource allocation problems known to be NP-Complete. To address this complex resource management problem, a Qdecomposition...
Pierrick Plamondon, Brahim Chaib-draa, Abder Rezak...
118
Voted
SIGCSE
2006
ACM
147views Education» more  SIGCSE 2006»
15 years 8 months ago
Image understanding as a second course in AI: preparing students for research
This paper describes the development and structure of a second course in artificial intelligence that was developed to meet the needs of upper-division undergraduate and graduate ...
Roxanne L. Canosa
ICMCS
2005
IEEE
88views Multimedia» more  ICMCS 2005»
15 years 8 months ago
Spoken document summarization using acoustic, prosodic and semantic information
This paper presents a spoken document summarization scheme using acoustic, prosodic and semantic information. First, speech recognition confidence is estimated to choose reliable ...
Chien-Lin Huang, Chia-Hsin Hsieh, Chung-Hsien Wu
108
Voted
ISCAS
2005
IEEE
138views Hardware» more  ISCAS 2005»
15 years 8 months ago
Transition time bounded low-power clock tree construction
— Recently power becomes a significant issue in clock network design for high-performance ICs because the clock network consumes a large portion of the total power in the whole s...
Min Pan, Chris C. N. Chu, J. Morris Chang