Sciweavers

725 search results - page 68 / 145
» heuristics 2010
Sort
View
DSD
2010
IEEE
135views Hardware» more  DSD 2010»
13 years 10 months ago
An Approximate Maximum Common Subgraph Algorithm for Large Digital Circuits
—This paper presents an approximate Maximum Common Subgraph (MCS) algorithm, specifically for directed, cyclic graphs representing digital circuits. Because of the application d...
Jochem H. Rutgers, Pascal T. Wolkotte, Philip K. F...
ICASSP
2010
IEEE
13 years 10 months ago
Using online model comparison in the Variational Bayes framework for online unsupervised Voice Activity Detection
This paper presents the use of online Variational Bayes method for online Voice Activity Detection (VAD) in an unsupervised context. In conventional VAD, the final step often rel...
David Cournapeau, Shinji Watanabe, Atsushi Nakamur...
CORR
2010
Springer
161views Education» more  CORR 2010»
13 years 10 months ago
Database Reverse Engineering based on Association Rule Mining
Maintaining a legacy database is a difficult task especially when system documentation is poor written or even missing. Database reverse engineering is an attempt to recover high-...
Nattapon Pannurat, Nittaya Kerdprasop, Kittisak Ke...
CORR
2010
Springer
83views Education» more  CORR 2010»
13 years 10 months ago
Utility Constrained Energy Minimization In Aloha Networks
In this paper we consider the issue of energy efficiency in random access networks and show that optimizing transmission probabilities of nodes can enhance network performance in t...
Amir Mahdi Khodaian, Babak Hossein Khalaj, Mohamma...
AAAI
2010
13 years 9 months ago
Simultaneous Elicitation of Preference Features and Utility
Most frameworks for utility elicitation assume a predefined set of features over which user preferences are expressed. We consider utility elicitation in the presence of subjecti...
Craig Boutilier, Kevin Regan, Paolo Viappiani