Sciweavers

1563 search results - page 223 / 313
» Performance comparison of memetic algorithms
Sort
View
136
Voted
ISCI
2007
170views more  ISCI 2007»
15 years 3 months ago
Automatic learning of cost functions for graph edit distance
Graph matching and graph edit distance have become important tools in structural pattern recognition. The graph edit distance concept allows us to measure the structural similarit...
Michel Neuhaus, Horst Bunke
106
Voted
TNN
2008
133views more  TNN 2008»
15 years 3 months ago
A General Wrapper Approach to Selection of Class-Dependent Features
In this paper, we argue that for a C-class classification problem, C 2-class classifiers, each of which discriminating one class from the other classes and having a characteristic ...
Lipo Wang, Nina Zhou, Feng Chu
DPD
2002
125views more  DPD 2002»
15 years 3 months ago
Parallel Mining of Outliers in Large Database
Data mining is a new, important and fast growing database application. Outlier (exception) detection is one kind of data mining, which can be applied in a variety of areas like mon...
Edward Hung, David Wai-Lok Cheung
124
Voted
CIKM
2010
Springer
15 years 2 months ago
FD-buffer: a buffer manager for databases on flash disks
We design and implement FD-Buffer, a buffer manager for database systems running on flash-based disks. Unlike magnetic disks, flash media has an inherent read-write asymmetry: w...
Sai Tung On, Yinan Li, Bingsheng He, Ming Wu, Qion...
ICCAD
2009
IEEE
93views Hardware» more  ICCAD 2009»
15 years 1 months ago
An efficient wakeup scheduling considering resource constraint for sensor-based power gating designs
Power gating has been a very effective way to reduce leakage power. One important design issue for a power gating design is to limit the surge current during the wakeup process. N...
Ming-Chao Lee, Yu-Ting Chen, Yo-Tzu Cheng, Shih-Ch...