Sciweavers

6251 search results - page 1059 / 1251
» Randomness, Computability, and Density
Sort
View
VALUETOOLS
2006
ACM
107views Hardware» more  VALUETOOLS 2006»
15 years 10 months ago
Thresholds for virus spread on networks
We study how the spread of computer viruses, worms, and other self-replicating malware is affected by the logical topology of the network over which they propagate. We consider a...
Moez Draief, Ayalvadi J. Ganesh, Laurent Massouli&...
DATE
2005
IEEE
115views Hardware» more  DATE 2005»
15 years 10 months ago
Stochastic Power Grid Analysis Considering Process Variations
In this paper, we investigate the impact of interconnect and device process variations on voltage fluctuations in power grids. We consider random variations in the power grid’s...
Praveen Ghanta, Sarma B. K. Vrudhula, Rajendran Pa...
ENC
2005
IEEE
15 years 10 months ago
Saving Evaluations in Differential Evolution for Constrained Optimization
Generally, evolutionary algorithms require a large number of evaluations of the objective function in order to obtain a good solution. This paper presents a simple approach to sav...
Efrén Mezura-Montes, Carlos A. Coello Coell...
ICDM
2005
IEEE
190views Data Mining» more  ICDM 2005»
15 years 10 months ago
Neighborhood Formation and Anomaly Detection in Bipartite Graphs
Many real applications can be modeled using bipartite graphs, such as users vs. files in a P2P system, traders vs. stocks in a financial trading system, conferences vs. authors ...
Jimeng Sun, Huiming Qu, Deepayan Chakrabarti, Chri...
ICMCS
2005
IEEE
161views Multimedia» more  ICMCS 2005»
15 years 10 months ago
Gender identification using frontal facial images
Computer vision and pattern recognition systems play an important role in our lives by means of automated face detection, face and gesture recognition, and estimation of gender an...
Amit Jain, Jeffrey Huang, Shiaofen Fang
« Prev « First page 1059 / 1251 Last » Next »