نتایج جستجو برای: random hill climbing algorithm

تعداد نتایج: 1014286  

Journal: :Pattern Recognition 2010
Javier Galbally Chris McCool Julian Fiérrez Sébastien Marcel Javier Ortega-Garcia

In this paper, we use a hill-climbing attack algorithm based on Bayesian adaption to test the vulnerability of two face recognition systems to indirect attacks. The attacking technique uses the scores provided by the matcher to adapt a global distribution computed from an independent set of users, to the local specificities of the client being attacked. The proposed attack is evaluated on an ei...

Journal: :Annals OR 2015
Raka Jovanovic Abdelkader Bousselham Stefan Voß

In this paper we present a greedy algorithm for solving the problem of the maximum partitioning of graphs with supply and demand (MPGSD). The goal of the method is to solve the MPGSD for large graphs in a reasonable time limit. This is done by using a two stage greedy algorithm, with two corresponding types of heuristics. The solutions acquired in this way are improved by applying a computation...

2001
Tuomas Sandholm Subhash Suri Andrew Gilpin David Levine

Combinatorial auctions where bidders can bid on bundles of items can lead to more economical allocations, but determining the winners is NP-complete and inapproximable. We present CABOB, a sophisticated search algorithm for the problem. It uses decomposition techniques, upper and lower bounding (also across components), elaborate and dynamically chosen bid ordering heuristics, and a host of str...

1998
Paola Monachesi

In this paper, motivations are presented to argue in favor of the affixal status of Romanian pronominal clitics. It will be suggested that they should not be considered lexical items, i.e. ‘signs’, which are located in a special position by rules of syntax, but a complex of syntactic and semantic information which is provided in the lexicon for the morphophonological realization of the cliticiz...

2011
Amanullah YASIN Philippe LERAY

Nowadays there are a huge number of applications produce the immense amount of data in the form of a data stream, which needs real time analysis. Sensor networks, real-time surveillance and telecommunication systems are the examples of such applications. The real time analysis of the data stream leads to a number of computational and mining challenges. In this scenario new data arrives continuo...

2001
Robert C. Holte

This paper examines the performance of hill-climbing algorithms on standard test problems for combinatorial auctions (CAs). On single-unit CAs, deterministic hill-climbers are found to perform well, and their performance can be improved signiicantly by randomizing them and restarting them several times, or by using them collectively. For some problems this good performance is shown to be no bet...

2007
Yen-Wen Lu Kallol Bagchi James B. Burr Allen M. Peterson

Wormhole routing is an attractive scheme for large mul-ticomputer networks. In this paper, we include several such representative schemes and make performance comparisons via simulation on an N N torus with nearest neighbor connections. A systematic performance scheme is followed, which shows that among all these 6 algorithms, worm1, a hill-climbing version, has a better performance. worm1, in ...

2007
Yen-Wen Lu James B. Burr

Data routing is one of the most important problems in parallel networks. Long latency in low dimensional networks can be solved by including segmented reconngurable buses (SRB). In addition to physical limitation we choose the segment length such that we may get the best resource utilization and minimize the average latency. After choosing the segment length, we have to arrange these segments c...

2007
Darrell Conklin Mathieu Bergeron

This paper presents a method for pattern discovery based on viewpoints and feature set patterns. The representation for pattern components accommodates in a fully general way the taxonomic relationships that may exist between interval classes. A heuristic probabilistic hill climbing algorithm is developed to rapidly direct the search towards interesting patterns. The method can be used for sing...

2003
Kenneth A. Frank

Cohesive subgroups have always represented an important construct for sociologists who study individuals and organizations. In this article, I apply recent advances in the statistical modell ing of social network data to the task of identifying cohesive subgroups from social network data. Further, through simulated data, I describe a process for obtaining the probability that a given sample of ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید