Sciweavers

1563 search results - page 161 / 313
» Performance comparison of memetic algorithms
Sort
View
124
Voted
WEA
2009
Springer
104views Algorithms» more  WEA 2009»
15 years 10 months ago
Univariate Algebraic Kernel and Application to Arrangements
We present a cgal-based univariate algebraic kernel, which provides certied real-root isolation of univariate polynomials with integer coecients and standard functionalities such...
Sylvain Lazard, Luis Mariano Peñaranda, Eli...
125
Voted
SMC
2007
IEEE
103views Control Systems» more  SMC 2007»
15 years 10 months ago
A new evaluation measure for information retrieval systems
Abstract— Some of the established approaches to evaluating text clustering algorithms for information retrieval show theoretical flaws. In this paper, we analyze these flaws an...
Martin Mehlitz, Christian Bauckhage, Jér&oc...
119
Voted
ICDM
2005
IEEE
117views Data Mining» more  ICDM 2005»
15 years 9 months ago
On Learning Asymmetric Dissimilarity Measures
Many practical applications require that distance measures to be asymmetric and context-sensitive. We introduce Context-sensitive Learnable Asymmetric Dissimilarity (CLAD) measure...
Krishna Kummamuru, Raghu Krishnapuram, Rakesh Agra...
132
Voted
AVBPA
2005
Springer
275views Biometrics» more  AVBPA 2005»
15 years 9 months ago
Vulnerabilities in Biometric Encryption Systems
Abstract. The goal of a biometric encryption system is to embed a secret into a biometric template in a way that can only be decrypted with a biometric image from the enroled perso...
Andy Adler
113
Voted
ECCV
2010
Springer
15 years 9 months ago
Converting Level Set Gradients to Shape Gradients
The level set representation of shapes is useful for shape evolution and is widely used for the minimization of energies with respect to shapes. Many algorithms consider energies d...