Sciweavers

GECCO
2008
Springer
146views Optimization» more  GECCO 2008»
13 years 10 months ago
Automatic circle detection on images with an adaptive bacterial foraging algorithm
This article presents an algorithm for the automatic detection of circular shapes from complicated and noisy images. The algorithm is based on a recently developed swarm-intellige...
Sambarta Dasgupta, Arijit Biswas, Swagatam Das, Aj...
GECCO
2008
Springer
111views Optimization» more  GECCO 2008»
13 years 10 months ago
Single-objective front optimization: application to rf circuit design
This paper proposes a new algorithm which promotes well distributed non-dominated fronts in the parameters space when a single-objective function is optimized. This algorithm is b...
Eduardo José Solteiro Pires, Luís Me...
GECCO
2008
Springer
229views Optimization» more  GECCO 2008»
13 years 10 months ago
EIN-WUM: an AIS-based algorithm for web usage mining
With the ever expanding Web and the information published on it, effective tools for managing such data and presenting information to users based on their needs are becoming nece...
Adel Torkaman Rahmani, B. Hoda Helmi
CVPR
2008
IEEE
13 years 10 months ago
Recursive photometric stereo when multiple shadows and highlights are present
We present a recursive algorithm for 3D surface reconstruction based on Photometric Stereo in the presence of highlights, and self and cast shadows. We assume that the surface reï...
Vasileios Argyriou, Maria Petrou
CPAIOR
2009
Springer
13 years 10 months ago
Max Energy Filtering Algorithm for Discrete Cumulative Resources
Abstract. In scheduling using constraint programming we usually reason only about possible start times and end times of activities and remove those which are recognized as unfeasib...
Petr Vilím
DAWAK
2010
Springer
13 years 10 months ago
Discovery and Application of Functional Dependencies in Conjunctive Query Mining
Abstract. We present an algorithm for mining frequent queries in arbitrary relational databases, over which functional dependencies are assumed. Building upon previous results, we ...
Bart Goethals, Dominique Laurent, Wim Le Page
CSL
2010
Springer
13 years 10 months ago
Exact Exploration and Hanging Algorithms
Abstract. Recent analysis of sequential algorithms resulted in their axiomatization and in a representation theorem stating that, for any sealgorithm, there is an abstract state ma...
Andreas Blass, Nachum Dershowitz, Yuri Gurevich
CRYPTO
2010
Springer
110views Cryptology» more  CRYPTO 2010»
13 years 10 months ago
An Efficient and Parallel Gaussian Sampler for Lattices
At the heart of many recent lattice-based cryptographic schemes is a polynomial-time algorithm that, given a `high-quality' basis, generates a lattice point according to a Ga...
Chris Peikert
CLEF
2010
Springer
13 years 10 months ago
A Plagiarism Detector for Intrinsic Plagiarism - Lab Report for PAN at CLEF 2010
In this paper, we describe the algorithm that has been used to carry out our plagiarism detection within the context of PAN10 competition. Our system is based on the LempelZiv dist...
Pablo Suárez, José Carlos Gonz&aacut...
CEC
2010
IEEE
13 years 10 months ago
A novel memetic algorithm for constrained optimization
In this paper, we present a memetic algorithm with novel local optimizer hybridization strategy for constrained optimization. The developed MA consists of multiple cycles. In each ...
Jianyong Sun, Jonathan M. Garibaldi