Sciweavers

6251 search results - page 1115 / 1251
» Randomness, Computability, and Density
Sort
View
CORR
2010
Springer
102views Education» more  CORR 2010»
14 years 11 months ago
Superior Exploration-Exploitation Balance with Quantum-Inspired Hadamard Walks
This paper extends the analogies employed in the development of quantum-inspired evolutionary algorithms by proposing quantum-inspired Hadamard walks, called QHW. A novel quantum-...
Sisir Koppaka, Ashish Ranjan Hota
143
Voted
IJCV
2011
152views more  IJCV 2011»
14 years 11 months ago
Recovering Occlusion Boundaries from an Image
Occlusion reasoning is a fundamental problem in computer vision. In this paper, we propose an algorithm to recover the occlusion boundaries and depth ordering of free-standing str...
Derek Hoiem, Alexei A. Efros, Martial Hebert
OL
2011
332views Neural Networks» more  OL 2011»
14 years 11 months ago
A robust implementation of a sequential quadratic programming algorithm with successive error restoration
We consider sequential quadratic programming (SQP) methods for solving constrained nonlinear programming problems. It is generally believed that SQP methods are sensitive to the a...
Klaus Schittkowski
TEC
2011
134views more  TEC 2011»
14 years 11 months ago
Differential Evolution: A Survey of the State-of-the-Art
—Differential evolution (DE) is arguably one of the most powerful stochastic real-parameter optimization algorithms in current use. DE operates through similar computational step...
Swagatam Das, Ponnuthurai Nagaratnam Suganthan
TIT
2011
125views more  TIT 2011»
14 years 11 months ago
Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
Abstract. In 1998, Blaze, Bleumer, and Strauss proposed a cryptographic primitive called proxy re-encryption, in which a proxy transforms – without seeing the corresponding plain...
Benoît Libert, Damien Vergnaud
« Prev « First page 1115 / 1251 Last » Next »