Sciweavers

SCALESPACE
2005
Springer
14 years 3 months ago
Stability of Top-Points in Scale Space
This paper presents an algorithm for computing stability of top-points in scale-space. The potential usefulness of top-points in scalespace has already been shown for a number of a...
Evguenia Balmachnova, Luc Florack, Bram Platel, Fr...
SAT
2005
Springer
145views Hardware» more  SAT 2005»
14 years 3 months ago
A New Approach to Model Counting
We introduce ApproxCount, an algorithm that approximates the number of satisfying assignments or models of a formula in propositional logic. Many AI tasks, such as calculating degr...
Wei Wei, Bart Selman
SAT
2005
Springer
98views Hardware» more  SAT 2005»
14 years 3 months ago
Faster Exact Solving of SAT Formulae with a Low Number of Occurrences per Variable
We present an algorithm that decides the satisfiability of a
Magnus Wahlström
SAT
2005
Springer
95views Hardware» more  SAT 2005»
14 years 3 months ago
Random Walk with Continuously Smoothed Variable Weights
Many current local search algorithms for SAT fall into one of two classes. Random walk algorithms such as Walksat/SKC, Novelty+ and HWSAT are very successful but can be trapped for...
Steven David Prestwich
RISE
2005
Springer
14 years 3 months ago
Software Testing with Evolutionary Strategies
Abstract. This paper applies the Evolutionary Strategy (ES) metaheuristic to the automatic test data generation problem. The problem consists in creating automatically a set of inp...
Enrique Alba, J. Francisco Chicano
PVM
2005
Springer
14 years 3 months ago
Implementing Byte-Range Locks Using MPI One-Sided Communication
We present an algorithm for implementing byte-range locks using MPI passive-target one-sided communication. This algorithm is useful in any scenario in which multiple processes of ...
Rajeev Thakur, Robert B. Ross, Robert Latham
PDCAT
2005
Springer
14 years 3 months ago
A New Algorithm to Solve Synchronous Consensus for Dependent Failures
Fault tolerant algorithms are often designed under the t-out-of-n assumption, which is based on the assumption that all processes or components fail independently with equal proba...
Jun Wang, Min Song
MLDM
2005
Springer
14 years 3 months ago
CorePhrase: Keyphrase Extraction for Document Clustering
Abstract. The ability to discover the topic of a large set of text documents using relevant keyphrases is usually regarded as a very tedious task if done by hand. Automatic keyphra...
Khaled M. Hammouda, Diego N. Matute, Mohamed S. Ka...
MCS
2005
Springer
14 years 3 months ago
Ensemble Confidence Estimates Posterior Probability
We have previously introduced the Learn++ algorithm that provides surprisingly promising performance for incremental learning as well as data fusion applications. In this contribut...
Michael Muhlbaier, Apostolos Topalis, Robi Polikar
LCTRTS
2005
Springer
14 years 3 months ago
Upper bound for defragmenting buddy heaps
Knuth’s buddy system is an attractive algorithm for managing storage allocation, and it can be made to operate in real-time. At some point, storage-management systems must eithe...
Delvin C. Defoe, Sharath R. Cholleti, Ron Cytron