Sciweavers

1675 search results - page 124 / 335
» The Value of a Good Name
Sort
View
ICCAD
2004
IEEE
121views Hardware» more  ICCAD 2004»
14 years 7 months ago
Factoring and eliminating common subexpressions in polynomial expressions
Polynomial expressions are used to compute a wide variety of mathematical functions commonly found in signal processing and graphics applications, which provide good opportunities...
Anup Hosangadi, Farzan Fallah, Ryan Kastner
CEC
2009
IEEE
14 years 4 months ago
Evolutionary image segmentation based on multiobjective clustering
— In the fields of image processing and recognition, image segmentation is an important basic technique in which an image is partitioned into multiple regions (sets of pixels). ...
Shinichi Shirakawa, Tomoharu Nagao
CEC
2009
IEEE
14 years 4 months ago
Comparing parameter tuning methods for evolutionary algorithms
Abstract— Tuning the parameters of an evolutionary algorithm (EA) to a given problem at hand is essential for good algorithm performance. Optimizing parameter values is, however,...
Selmar K. Smit, A. E. Eiben
IEEEIAS
2009
IEEE
14 years 4 months ago
Analysis of One-way Alterable Length Hash Function Based on Cell Neural Network
: In this paper, a hash function construction method based on cell neural network (CNN) with hyper-chaos characteristics is proposed. The chaos sequence is generated by iterating C...
Qun-ting Yang, Tie-gang Gao, Li Fan, Qiao-lun Gu
TSD
2009
Springer
14 years 4 months ago
Improving the Clustering of Blogosphere with a Self-term Enriching Technique
The analysis of blogs is emerging as an exciting new area in the text processing field which attempts to harness and exploit the vast quantity of information being published by ind...
Fernando Perez-Tellez, David Pinto, John Cardiff, ...