Sciweavers

1563 search results - page 267 / 313
» Performance comparison of memetic algorithms
Sort
View
ACL
2010
13 years 5 months ago
Structural Semantic Relatedness: A Knowledge-Based Method to Named Entity Disambiguation
Name ambiguity problem has raised urgent demands for efficient, high-quality named entity disambiguation methods. In recent years, the increasing availability of large-scale, rich...
Xianpei Han, Jun Zhao
FPL
2010
Springer
129views Hardware» more  FPL 2010»
13 years 5 months ago
FPGA Implementations of the Round Two SHA-3 Candidates
Abstract--The second round of the NIST-run public competition is underway to find a new hash algorithm(s) for inclusion in the NIST Secure Hash Standard (SHA-3). This paper present...
Brian Baldwin, Andrew Byrne, Liang Lu, Mark Hamilt...
ICDM
2010
IEEE
147views Data Mining» more  ICDM 2010»
13 years 5 months ago
Subgroup Discovery Meets Bayesian Networks -- An Exceptional Model Mining Approach
Whenever a dataset has multiple discrete target variables, we want our algorithms to consider not only the variables themselves, but also the interdependencies between them. We pro...
Wouter Duivesteijn, Arno J. Knobbe, Ad Feelders, M...
ICPR
2010
IEEE
13 years 5 months ago
Unsupervised Image Retrieval with Similar Lighting Conditions
In this work a new method to retrieve images with similar lighting conditions is presented. It is based on automatic clustering and automatic indexing. Our proposal belongs to Con...
J. Felix Serrano, Carlos Avilés, Humberto S...
IEAAIE
2010
Springer
13 years 5 months ago
Using Remote Data Mining on LIDAR and Imagery Fusion Data to Develop Land Cover Maps
Remote sensing based on imagery has traditionally been the main tool used to extract land uses and land cover (LULC) maps. However, more powerful tools are needed in order to fulfi...
Jorge García-Gutiérrez, Francisco Ma...