Sciweavers

6348 search results - page 1263 / 1270
» A Lesson for Software Engineering from Knowledge Engineering
Sort
View
CIVR
2010
Springer
215views Image Analysis» more  CIVR 2010»
13 years 11 months ago
Multi modal semantic indexing for image retrieval
Popular image retrieval schemes generally rely only on a single mode, (either low level visual features or embedded text) for searching in multimedia databases. Many popular image...
Chandrika Pulla, C. V. Jawahar
GECCO
2006
Springer
161views Optimization» more  GECCO 2006»
13 years 11 months ago
An empirical investigation of how and why neutrality affects evolutionary search
The effects of neutrality on evolutionary search have been considered in a number of interesting studies, the results of which, however, have been contradictory. Some researchers ...
Edgar Galván López, Riccardo Poli
ICS
2000
Tsinghua U.
13 years 11 months ago
Automatic loop transformations and parallelization for Java
From a software engineering perspective, the Java programming language provides an attractive platform for writing numerically intensive applications. A major drawback hampering i...
Pedro V. Artigas, Manish Gupta, Samuel P. Midkiff,...
SBIA
1995
Springer
13 years 11 months ago
Modeling the Influence of Non-Changing Quantities
ion Framework for Compositional Modeling 36 Diane Chi and Yumi Iwasaki Model Decomposition and Simulation 45 Daniel J. Clancy and Benjamin Kuipers A Distance Measure for Attention ...
Bert Bredeweg, Kees de Koning, Cis Schut
CCS
2008
ACM
13 years 9 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
« Prev « First page 1263 / 1270 Last » Next »