Sciweavers

7522 search results - page 1348 / 1505
» Spacing memetic algorithms
Sort
View
SIAMSC
2010
155views more  SIAMSC 2010»
13 years 5 months ago
Quasi-Newton Methods on Grassmannians and Multilinear Approximations of Tensors
In this paper we proposed quasi-Newton and limited memory quasi-Newton methods for objective functions defined on Grassmannians or a product of Grassmannians. Specifically we defin...
Berkant Savas, Lek-Heng Lim
TCIAIG
2010
13 years 5 months ago
The Parametrized Probabilistic Finite-State Transducer Probe Game Player Fingerprint Model
Abstract--Fingerprinting operators generate functional signatures of game players and are useful for their automated analysis independent of representation or encoding. The theory ...
Jeffrey Tsang
TDP
2010
189views more  TDP 2010»
13 years 5 months ago
The PROBE Framework for the Personalized Cloaking of Private Locations
The widespread adoption of location-based services (LBS) raises increasing concerns for the protection of personal location information. A common strategy, referred to as obfuscati...
Maria Luisa Damiani, Elisa Bertino, Claudio Silves...
TIT
2010
124views Education» more  TIT 2010»
13 years 5 months ago
Storage coding for wear leveling in flash memories
NAND flash memories are currently the most widely used type of flash memories. In a NAND flash memory, although a cell block consists of many pages, to rewrite one page, the whole ...
Anxiao Jiang, Robert Mateescu, Eitan Yaakobi, Jeho...
TIT
2010
82views Education» more  TIT 2010»
13 years 5 months ago
Average message delivery time for small-world networks in the continuum limit
Small-world networks are networks in which the graphical diameter of the network is as small as the diameter of random graphs but whose nodes are highly clustered when compared wit...
Hazer Inaltekin, Mung Chiang, H. Vincent Poor
« Prev « First page 1348 / 1505 Last » Next »