Sciweavers

225 search results - page 22 / 45
» Retargetable binary utilities
Sort
View
ICPR
2002
IEEE
14 years 16 days ago
Assembly of Puzzles Using a Genetic Algorithm
In this paper, we proposed a method for solving the rectangle piece jigsaw puzzle assembly problem. A shape of a piece is a rectangle, and a picture of a puzzle is only painted in...
Fubito Toyama, Yukihiro Fujiki, Kenji Shoji, Juich...
COCO
2001
Springer
142views Algorithms» more  COCO 2001»
14 years 3 days ago
On the Complexity of Approximating the VC Dimension
We study the complexity of approximating the VC dimension of a collection of sets, when the sets are encoded succinctly by a small circuit. We show that this problem is • Σp 3-...
Elchanan Mossel, Christopher Umans
SACRYPT
2001
Springer
106views Cryptology» more  SACRYPT 2001»
14 years 1 days ago
Fast Normal Basis Multiplication Using General Purpose Processors
—For cryptographic applications, normal bases have received considerable attention, especially for hardware implementation. In this article, we consider fast software algorithms ...
Arash Reyhani-Masoleh, M. Anwarul Hasan
CVPR
1997
IEEE
13 years 11 months ago
Gradient Vector Flow: A New External Force for Snakes
Snakes, or active contours, are used extensively in computer vision and image processing applications, particularly to locate object boundaries. Problems associated with initializ...
Chenyang Xu, Jerry L. Prince
DBKDA
2009
IEEE
136views Database» more  DBKDA 2009»
13 years 11 months ago
Visualization and Integration of Databases Using Self-Organizing Map
Abstract--With the growing computer networks, accessible data is becoming increasing distributed. Understanding and integrating remote and unfamiliar data sources are important dat...
Farid Bourennani, Ken Q. Pu, Ying Zhu