Sciweavers

6312 search results - page 1134 / 1263
» A design framework for metaheuristics
Sort
View
IJACTAICIT
2010
122views more  IJACTAICIT 2010»
13 years 6 months ago
Intelligent Integrated Management for Telecommunication Networks
As the size of communication networks keeps on growing, faster connections, cooperating technologies and the divergence of equipment and data communications, the management of the...
Antonio Martín, Carlos León, F&eacut...
CVPR
2011
IEEE
13 years 4 months ago
Deformation and Illumination Invariant Feature Point Descriptor
Recent advances in 3D shape recognition have shown that kernels based on diffusion geometry can be effectively used to describe local features of deforming surfaces. In this paper...
Francesc Moreno (Institut de Robotica i Informatic...
CORR
2011
Springer
147views Education» more  CORR 2011»
13 years 4 months ago
Human-Assisted Graph Search: It's Okay to Ask Questions
We consider the problem of human-assisted graph search: given a directed acyclic graph with some (unknown) target node(s), we consider the problem of finding the target node(s) b...
Aditya G. Parameswaran, Anish Das Sarma, Hector Ga...
CORR
2011
Springer
176views Education» more  CORR 2011»
13 years 4 months ago
Inner approximations for polynomial matrix inequalities and robust stability regions
Following a polynomial approach, many robust fixed-order controller design problems can be formulated as optimization problems whose set of feasible solutions is modelled by para...
Didier Henrion, Jean B. Lasserre
IJNVO
2011
47views more  IJNVO 2011»
13 years 4 months ago
Harvesting covert networks: a case study of the iMiner database
: Data collection of covert networks is an inherently difficult task because of the very nature of these networks. Researchers find it difficult to locate and access data relating ...
Nasrullah Memon, Uffe Kock Wiil, Reda Alhajj, Clau...
« Prev « First page 1134 / 1263 Last » Next »