Sciweavers

1717 search results - page 22 / 344
» On the analysis of the (1 1) memetic algorithm
Sort
View
DRR
2011
12 years 8 months ago
Improved document image segmentation algorithm using multiresolution morphology
Page segmentation into text and non-text components is an essential preprocessing step before OCR operation. If this is not done properly, an OCR classification engine produces g...
Syed Saqib Bukhari, Faisal Shafait, Thomas M. Breu...
DELTA
2010
IEEE
14 years 1 months ago
Independent Component Analysis Applied to Watermark Extraction and its Implemented Model on FPGAs
: Most of published audio watermark algorithms are suffered a trade-off between inaudibility and detectibility, and the detection performance depends greatly on the strength of noi...
Thuong Le-Tien, Dien Vo-Ngoc, Lan Ngo-Hoang, Sung ...
SODA
2010
ACM
175views Algorithms» more  SODA 2010»
14 years 5 months ago
An Online Scalable Algorithm for Average Flow Time in Broadcast Scheduling
In this paper the online pull-based broadcast model is considered. In this model, there are n pages of data stored at a server and requests arrive for pages online. When the serve...
Benjamin Moseley, Sungjin Im
TCS
2010
13 years 6 months ago
Tight results for Next Fit and Worst Fit with resource augmentation
It is well known that the two simple algorithms for the classic bin packing problem, NF and WF both have an approximation ratio of 2. However, WF seems to be a more reasonable alg...
Joan Boyar, Leah Epstein, Asaf Levin
CN
2006
83views more  CN 2006»
13 years 8 months ago
A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms
This paper presents an assessment of the communication overheads of IPsec and evaluates the feasibility of deploying it on handheld devices for the UMTS architecture. A wide range...
Christos Xenakis, Nikolaos Laoutaris, Lazaros F. M...