Sciweavers

7522 search results - page 1346 / 1505
» Spacing memetic algorithms
Sort
View
NFM
2011
242views Formal Methods» more  NFM 2011»
13 years 5 months ago
Model Checking Using SMT and Theory of Lists
A main idea underlying bounded model checking is to limit the length of the potential counter-examples, and then prove properties for the bounded version of the problem. In softwar...
Aleksandar Milicevic, Hillel Kugler
PAMI
2011
13 years 5 months ago
Kernel Optimization in Discriminant Analysis
— Kernel mapping is one of the most used approaches to intrinsically derive nonlinear classifiers. The idea is to use a kernel function which maps the original nonlinearly separ...
Di You, Onur C. Hamsici, Aleix M. Martínez
SIAMAM
2011
13 years 5 months ago
Imaging Schemes for Perfectly Conducting Cracks
We consider the problem of locating perfectly conducting cracks and estimating their geometric features from multi-static response matrix measurements at a single or multiple frequ...
Habib Ammari, Josselin Garnier, Hyeonbae Kang, Won...
TVCG
2011
146views more  TVCG 2011»
13 years 5 months ago
Visibility Histograms and Visibility-Driven Transfer Functions
—Direct volume rendering is an important tool for visualizing complex data sets. However, in the process of generating 2D images from 3D data, information is lost in the form of ...
Carlos D. Correa, Kwan-Liu Ma
TWC
2011
291views more  TWC 2011»
13 years 5 months ago
On Optimal Cooperator Selection Policies for Multi-Hop Ad Hoc Networks
Abstract—In this paper we consider wireless cooperative multihop networks, where nodes that have decoded the message at the previous hop cooperate in the transmission toward the ...
Michele Rossi, Cristiano Tapparello, Stefano Tomas...
« Prev « First page 1346 / 1505 Last » Next »