Sciweavers

172 search results - page 21 / 35
» Finding Optimal Addition Chains Using a Genetic Algorithm Ap...
Sort
View
CEC
2010
IEEE
13 years 8 months ago
Classifier-assisted constrained evolutionary optimization for automated geometry selection of orthodontic retraction spring
In orthodontics, retraction springs made of metallic wires are often used to move a tooth with respect to another by the virtue of the spring back effect. Specially selected form o...
Dudy Lim, Yew-Soon Ong, Rachman Setiawan, Muhammad...
QCQC
1998
Springer
154views Communications» more  QCQC 1998»
13 years 12 months ago
Automated Design of Quantum Circuits
In order to design a quantum circuit that performs a desired quantum computation, it is necessary to find a decomposition of the unitary matrix that represents that computation in ...
Colin P. Williams, Alexander G. Gray
ISCAS
2006
IEEE
112views Hardware» more  ISCAS 2006»
14 years 1 months ago
Towards an optimised VLSI design algorithm for the constant matrix multiplication problem
The efficient design of multiplierless implementa- The goal is to find the optimal sub-expressions across all N dot tions of constant matrix multipliers is challenged by the huge p...
Andrew Kinane, Valentin Muresan, Noel E. O'Connor
STOC
2004
ACM
107views Algorithms» more  STOC 2004»
14 years 8 months ago
Primal-dual algorithms for deterministic inventory problems
We consider several classical models in deterministic inventory theory: the single-item lot-sizing problem, the joint replenishment problem, and the multi-stage assembly problem. ...
Retsef Levi, Robin Roundy, David B. Shmoys
GECCO
2008
Springer
196views Optimization» more  GECCO 2008»
13 years 8 months ago
A fuzzy-genetic approach to network intrusion detection
Computer networks have expanded significantly in use and numbers. This expansion makes them more vulnerable to attack by malicious agents. Many current intrusion detection systems...
Terrence P. Fries