Sciweavers

2006 search results - page 277 / 402
» Heuristic Security-Testing Methods
Sort
View
GREC
2003
Springer
14 years 2 months ago
Resolving Ambiguities in Toponym Recognition in Cartographic Maps
To date many methods and programs for automatic text recognition exist. However there are no effective text recognition systems for graphic documents. Graphic documents usually con...
Alexander F. Gelbukh, Serguei Levachkine, Sang-Yon...
INFOCOM
2002
IEEE
14 years 2 months ago
Multicast Scheduling for List Requests
—Advances in wireless and optical communication, as well as in Internet multicast protocols, make broadcast and multicast methods an effective solution to disseminate data. In pa...
Vincenzo Liberatore
GECCO
2010
Springer
200views Optimization» more  GECCO 2010»
14 years 2 months ago
Multivariate multi-model approach for globally multimodal problems
This paper proposes an estimation of distribution algorithm (EDA) aiming at addressing globally multimodal problems, i.e., problems that present several global optima. It can be r...
Chung-Yao Chuang, Wen-Lian Hsu
GECCO
2010
Springer
233views Optimization» more  GECCO 2010»
14 years 2 months ago
Evolutionary-based conflict-free scheduling of collective communications on spidergon NoCs
The Spidergon interconnection network has become popular recently in multiprocessor systems on chips. To the best of our knowledge, algorithms for collective communications (CC) h...
Jirí Jaros, Vaclav Dvorak
FQAS
2009
Springer
142views Database» more  FQAS 2009»
14 years 2 months ago
On the Selection of the Best Retrieval Result Per Query - An Alternative Approach to Data Fusion
Some recent works have shown that the “perfect” selection of the best IR system per query could lead to a significant improvement on the retrieval performance. Motivated by thi...
Antonio Juárez-González, Manuel Mont...