the proceedings contain 6 papers. the topics discussed include: scalable algorithms for mining large databases;clustering techniques for large data sets-from the past to the future;mining unstructured data;combining e...
ISBN:
(纸本)1581131712
the proceedings contain 6 papers. the topics discussed include: scalable algorithms for mining large databases;clustering techniques for large data sets-from the past to the future;mining unstructured data;combining estimators to improve performance;and data mining by business users: integrating data mining in business processes.
the proceedings contain 41 papers. the special focus in this conference is on Principles and Practice of Constraint Programming. the topics include: the rough guide to constraint propagation;non-binary constraints;the...
ISBN:
(纸本)3540666265
the proceedings contain 41 papers. the special focus in this conference is on Principles and Practice of Constraint Programming. the topics include: the rough guide to constraint propagation;non-binary constraints;the theory of discrete lagrange multipliers for nonlinear discrete optimization;operational equivalence of CHR programs and constraints;automatic generation of constraint propagation algorithms for small finite domains;excluding symmetries in constraint based search;onforward checking for non-binary constraint satisfaction;enforcing arc consistency on global constraints by solving subCSPs on the fly;exploiting bipartiteness to identify yet another tractable subclass of CSP;towards a complete classification of tractability in point algebras for nonlinear time;a meta-heuristic factory for vehicle routing problems;closure functions and width 1 problems;cost-based domain filtering;resource allocation in networks using abstraction and constraint satisfaction techniques;optimal distributed arc-consistency;multistep filtering operators for ordinary differential equations and a framework for constraint programming based column generation.
the proceedings contain 20 papers. the special focus in this conference is on Verification of Probabilistic Systems and Model Checking Probabilistic Systems. the topics include: Quantitative program logic and performa...
ISBN:
(纸本)3540660100
the proceedings contain 20 papers. the special focus in this conference is on Verification of Probabilistic Systems and Model Checking Probabilistic Systems. the topics include: Quantitative program logic and performance in probabilistic distributed algorithms;establishing qualitative properties for probabilistic lossy channel systems;root contention in IEEE 1394;automatic verification of real-time systems with discrete probability distributions;probabilistic symbolic model checking;process algebra with probabilistic choice;an axiomatization of probabilistic testing;verification of hybrid systems;a parallel operator for real-time processes with predicate transformer semantics;comparing the efficiency of asynchronous systems;a formal model of real-time program compilation;semi-numerical solution of stochastic process algebra models;bisimulation algorithms for stochastic process algebras and their BDD-based implementation;probabilistic linear-time model checking;verifying progress in timed systems;proof assistance for real-time systems using an interactive theorem prover and modelling timeouts without timelocks.
the proceedings contain 59 papers. the special focus in this conference is on Parallel Computing in Regular Structures. the topics include: Analytical modeling of parallel application in heterogeneous computing enviro...
ISBN:
(纸本)3540663630
the proceedings contain 59 papers. the special focus in this conference is on Parallel Computing in Regular Structures. the topics include: Analytical modeling of parallel application in heterogeneous computing environments;skeletons and transformations in an integrated parallel programming environment;sequential unification and aggressive lookahead mechanisms for data memory accesses;a coordination model and facilities for efficient parallel computation;parallelizing of sequential programs on the basis of pipeline and speculative features of the operators;kinetic model of parallel data processing;PSA approach to population models for parallel genetic algorithms;highly accurate numerical methods for incompressible 3D fluid flows on parallel architectures;dynamic task scheduling with precedence constraints and communication delays;two-dimensional scheduling of algorithms with uniform dependencies;consistent lamport clocks for asynchronous groups with process crashes;comparative analysis of learning methods of cellular-neural associative memory;emergence and propagation of round autowave in cellular neural network;routing and embeddings in super cayley graphs;implementing cellular automata based models on parallel architectures;overview, design innovations, and preliminary results;implementing model checking and equivalence checking for time petri nets by the RT-MEC tool;learning concurrent programming;the speedup performance of an associative memory based logic simulator;a high-level programming environment for distributed memory architectures;virtual shared files;an object oriented environment to manage the parallelism of the FIIT applications;performance studies of shared-nothing parallel transaction processing systems;synergetic tool environments and logically instantaneous communication on top of distributed memory parallel machines.
the proceedings contain 32 papers. the special focus in this conference is on Asymmetric Key Cryptosystems and. the topics include: Modulus search for elliptic curve cryptosystems;on the lai-massey scheme;on cryptogra...
ISBN:
(纸本)3540666664
the proceedings contain 32 papers. the special focus in this conference is on Asymmetric Key Cryptosystems and. the topics include: Modulus search for elliptic curve cryptosystems;on the lai-massey scheme;on cryptographically secure vectorial boolean functions;cryptanalysis of five rounds of CRYPTON using impossible differentials;cryptanalysis of two cryptosystems based on group actions;probabilistic higher order differential attack and higher order bent functions;fast algorithms for elliptic curve cryptosystems over binary finite field;optimizing the menezes-okamoto-vanstone (MOV) algorithm for non-supersingular elliptic curves;speeding up the discrete log computation on curves with automorphisms;do we need to count?;elliptic scalar multiplication using point halving;on the design of RSA with short secret exponent;efficient public-key cryptosystems provably secure against active adversaries;adaptively-secure optimal-resilience proactive RSA;how to prove that a committed number is prime;reducing logarithms in totally non-maximal imaginary quadratic orders to logarithms in finite fields;general adversaries in unconditional multi-party computation;approximation hardness and secure communication in broadcast channels;mix-networks on permutation networks;secure communication in an unknown network using certificates;linear complexity versus pseudorandomness;a class of explicit perfect multi-sequences;cryptanalysis of LFSR-encrypted codes with unknown combining function;doing more with fewer bits;an efficient hierachical identity-based key-sharing method resistant against collusion-attacks;periodical multi-secret threshold cryptosystems;a signature scheme with message recovery as secure as discrete logarithm and broadcast authentication in group communication.
We present two different approaches for robust estimation of the parameters of context-dependent hidden Markov models (HMMs) for speech recognition. the first approach, the Gaussian Merging-Splitting (GMS) algorithm, ...
详细信息
the proceedings contain 39 papers. the topics discussed include: load adjustment and filtering based on process criticality;enhancing the real-time capability of the Linux kernel;enhancing response times of end-to-end...
ISBN:
(纸本)081869209X
the proceedings contain 39 papers. the topics discussed include: load adjustment and filtering based on process criticality;enhancing the real-time capability of the Linux kernel;enhancing response times of end-to-end tasks using slack of local tasks;a modified least-laxity-first scheduling algorithm for real-time tasks;multiprocessor scheduling of age constraint processes;a delay-constrained least-cost path routing protocol and the synthesis method;a bandwidth reservation algorithm for multi-application systems;resource reservation for multicast trees using multiagents;and on-line scheduling algorithms for reducing the largest weighted error incurred by imprecise tasks.
the proceedings contains 19 papers on Systems and Applications in Computer Graphics. Topics discussed include: curve rasterization;random walk radiosity;optimal ray shooting algorithms;global illumination;nibble meshi...
详细信息
the proceedings contains 19 papers on Systems and Applications in Computer Graphics. Topics discussed include: curve rasterization;random walk radiosity;optimal ray shooting algorithms;global illumination;nibble meshing;object reconstruction;object metamorphosis;chromatic interferometry;Poincare maps;image compression;enhancement algorithm;bump mapping;interactive computer games;moving fractal trees;and information technology-based lifelong learning.
the proceedings contain 101 papers. the topics discussed include: modeling genetic algorithms: from dependence with complete connections;a timing analysis of convergence to fitness sharing equilibrium;where elitists s...
ISBN:
(纸本)3540650784
the proceedings contain 101 papers. the topics discussed include: modeling genetic algorithms: from dependence with complete connections;a timing analysis of convergence to fitness sharing equilibrium;where elitists start limping: evolution strategies at ridge functions;where elitists start limping: evolution strategies at ridge functions;a bit-wise epistasis measure for binary search spaces;inside GA dynamics: ground basis for comparison;the effect of spin-flip symmetry on the performance of the simple GA;fitness distance correlation and ridge functions;accelerating the convergence of evolutionary algorithms by fitness landscape approximation;modeling building-block interdependency;creating robust solutions by means of evolutionary algorithms;analytic curve detection from a noisy binary edge map using genetic algorithm;and a comparison of dominance mechanisms and simple mutation on non-stationary problems.
In large-vocabulary, multi-pass speech recognition systems, it is desirable to generate word lattices incorporating a large number of hypotheses while keeping the lattice sizes small. We describe two new techniques fo...
详细信息
暂无评论