Sciweavers

2180 search results - page 136 / 436
» Algorithms for discovering bucket orders from data
Sort
View
UPP
2004
Springer
15 years 10 months ago
Inverse Design of Cellular Automata by Genetic Algorithms: An Unconventional Programming Paradigm
Evolving solutions rather than computing them certainly represents an unconventional programming approach. The general methodology of evolutionary computation has already been know...
Thomas Bäck, Ron Breukelaar, Lars Willmes
142
Voted
DAGM
2005
Springer
15 years 10 months ago
3D Surface Reconstruction by Combination of Photopolarimetry and Depth from Defocus
Abstract. In this paper we present a novel image-based 3D surface reconstruction technique that incorporates reflectance, polarisation, and defocus information into a variational ...
Pablo d'Angelo, Christian Wöhler
DICTA
2007
15 years 6 months ago
Biometric Based Cryptographic Key Generation from Faces
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
B. Chen, V. Chandran
ICDM
2009
IEEE
138views Data Mining» more  ICDM 2009»
15 years 2 months ago
Accurate Discovery of Valid Convoys from Moving Object Trajectories
Given a set of moving object trajectories, it is of interest to find a group of objects, called a convoy, that are spatially density-connected for a certain duration of time. Howev...
Hyunjin Yoon, Cyrus Shahabi
CIDM
2009
IEEE
15 years 9 months ago
An architecture and algorithms for multi-run clustering
—This paper addresses two main challenges for clustering which require extensive human effort: selecting appropriate parameters for an arbitrary clustering algorithm and identify...
Rachsuda Jiamthapthaksin, Christoph F. Eick, Vadee...