Sciweavers

2376 search results - page 135 / 476
» More Efficient Internal-Regret-Minimizing Algorithms
Sort
View
JCP
2008
145views more  JCP 2008»
13 years 7 months ago
An Effective Mining Algorithm for Weighted Association Rules in Communication Networks
The mining of weighted association rules is one of the primary methods used in communication alarm correlation analysis. With large communication alarm database, the traditional me...
Jian Wu, Xing ming Li
JEC
2006
73views more  JEC 2006»
13 years 7 months ago
Frame packing algorithms for automotive applications
The set of frames exchanged in automotive applications must meet two constraints: it has to be feasible from a schedulability point of view and it should minimize the network bandw...
Rishi Saket, Nicolas Navet
ACIVS
2007
Springer
14 years 2 months ago
Shape Extraction Via Heat Flow Analogy
Abstract. In this paper, we introduce a novel evolution-based segmentation algorithm by using the heat flow analogy, to gain practical advantage. The proposed algorithm consists of...
Cem Direkoglu, Mark S. Nixon
CP
2008
Springer
13 years 9 months ago
Revisiting the Upper Bounding Process in a Safe Branch and Bound Algorithm
Abstract. Finding feasible points for which the proof succeeds is a critical issue in safe Branch and Bound algorithms which handle continuous problems. In this paper, we introduce...
Alexandre Goldsztejn, Yahia Lebbah, Claude Michel,...
ECAI
2008
Springer
13 years 9 months ago
Game Theoretical Insights in Strategic Patrolling: Model and Algorithm in Normal-Form
Abstract. In artificial intelligence literature there is a rising interest in studying strategic interaction situations. In these situations a number of rational agents act strateg...
Nicola Gatti