Sciweavers

1717 search results - page 41 / 344
» On the analysis of the (1 1) memetic algorithm
Sort
View
ICPR
2004
IEEE
14 years 9 months ago
Classification Probability Analysis of Principal Component Null Space Analysis
In a previous paper [1], we have presented a new linear classification algorithm, Principal Component Null Space Analysis (PCNSA) which is designed for problems like object recogn...
Namrata Vaswani, Rama Chellappa
LICS
2003
IEEE
14 years 1 months ago
Polynomial-time Algorithms from Ineffective Proofs
We present a constructive procedure for extracting polynomial-time realizers from ineffective proofs of Π0 2theorems in feasible analysis. By ineffective proof we mean a proof wh...
Paulo Oliva
FSTTCS
2000
Springer
14 years 2 days ago
On-Line Edge-Coloring with a Fixed Number of Colors
We investigate a variant of on-line edge-coloring in which there is a fixed number of colors availableandtheaimistocolorasmanyedgesaspossible.Weproveupperandlowerboundsontheperform...
Lene M. Favrholdt, Morten N. Nielsen
ICCV
2007
IEEE
14 years 10 months ago
A Tool for Topographic Analysis of Electrode Contacts in Human Cortical Stimulation
Electric chronic stimulation of the human motor cortex (ECSM) has been reported to alleviate chronic severe pain. However the mechanism of action of ECSM is still hypothetical. Th...
Jean-Marie Favreau, Simone Hemm, Christophe Nuti, ...
DATE
2006
IEEE
84views Hardware» more  DATE 2006»
14 years 2 months ago
Vulnerability analysis of L2 cache elements to single event upsets
Memory elements are the most vulnerable system component to soft errors. Since memory elements in cache arrays consume a large fraction of the die in modern microprocessors, the p...
Hossein Asadi, Vilas Sridharan, Mehdi Baradaran Ta...