Sciweavers

667 search results - page 87 / 134
» Exceptions for Algorithmic Skeletons
Sort
View
ICANN
2005
Springer
14 years 2 months ago
Evolution of Heuristics for Give-Away Checkers
The efficacy of two evolutionary approaches to the problem of generation of heuristical linear and non-linear evaluation functions in the game of give-away checkers is tested in th...
Magdalena Kusiak, Karol Waledzik, Jacek Mandziuk
WG
2004
Springer
14 years 2 months ago
Computing Bounded-Degree Phylogenetic Roots of Disconnected Graphs
The Phylogenetic kth Root Problem (PRk) is the problem of finding a (phylogenetic) tree T from a given graph G = (V, E) such that (1) T has no degree-2 internal nodes, (2) the ex...
Zhi-Zhong Chen, Tatsuie Tsukiji
ICDM
2003
IEEE
141views Data Mining» more  ICDM 2003»
14 years 2 months ago
Association Rule Mining in Peer-to-Peer Systems
We extend the problem of association rule mining – a key data mining problem – to systems in which the database is partitioned among a very large number of computers that are ...
Ran Wolff, Assaf Schuster
IDMS
1997
Springer
106views Multimedia» more  IDMS 1997»
14 years 26 days ago
System for Screening Objectionable Images Using Daubechies' Wavelets and Color Histograms
Abstract. This paper describes WIPETM (Wavelet Image Pornography Elimination), an algorithm capable of classifying an image as objectionable or benign. The algorithm uses a combina...
James Ze Wang, Gio Wiederhold, Oscar Firschein
LCN
1994
IEEE
14 years 25 days ago
The Packet Starvation Effect in CSMA/CD LANs and a Solution
In this paper we explore the packet starvation effect (PSE) that occurs in Ethernet controllers due to the unfairness of the CSMA/CD algorithm. The PSE causes some packets to expe...
Brian Whetten, Stephen Steinberg, Domenico Ferrari