Sciweavers

1563 search results - page 180 / 313
» Performance comparison of memetic algorithms
Sort
View
138
Voted
ICPP
2008
IEEE
15 years 10 months ago
Optimizing JPEG2000 Still Image Encoding on the Cell Broadband Engine
JPEG2000 is the latest still image coding standard from the JPEG committee, which adopts new algorithms such as Embedded Block Coding with Optimized Truncation (EBCOT) and Discret...
Seunghwa Kang, David A. Bader
DAC
2004
ACM
16 years 4 months ago
A method to decompose multiple-output logic functions
This paper shows a method to decompose a given multipleoutput circuit into two circuits with intermediate outputs. We use a BDD for characteristic function (BDD for CF) to represe...
Tsutomu Sasao, Munehiro Matsuura
CEC
2008
IEEE
15 years 10 months ago
Dynamic adaptation and multiobjective concepts in a particle swarm optimizer for constrained optimization
— In this paper, we propose a novel approach to solve constrained optimization problems based on particle swarm optimization (PSO). First, an empirical comparison of the most pop...
Jorge Isacc Flores-Mendoza, Efrén Mezura-Mo...
IROS
2008
IEEE
93views Robotics» more  IROS 2008»
15 years 10 months ago
Adaptive motion planning for humanoid robots
— Motion planning for robots with many degrees of freedom (DoF) is a generally unsolved problem in the robotics context. In this work an approach for trajectory planning is prese...
Niko Vahrenkamp, Christian Scheurer, Tamim Asfour,...
127
Voted
SMC
2007
IEEE
113views Control Systems» more  SMC 2007»
15 years 10 months ago
Evaluation and implement of fuzzy vault scheme using indexed minutiae
— Juels et. al proposed a fuzzy vault scheme that extracts secret from inexact biometric information. However, typical feature extracted from fingerprint, called minutiae, is as...
Hiroaki Kikuchi, Yasunori Onuki, Kei Nagai