Sciweavers

2620 search results - page 180 / 524
» An Evaluation Technique for Binarization Algorithms
Sort
View
NOMS
2002
IEEE
130views Communications» more  NOMS 2002»
14 years 1 months ago
End-to-end service failure diagnosis using belief networks
We present fault localization techniques suitable for diagnosing end-to-end service problems in communication systems with complex topologies. We refine a layered system model th...
Malgorzata Steinder, Adarshpal S. Sethi
LWA
2008
13 years 9 months ago
Pre analysis and clustering of uncertain data from manufacturing processes
With increasing complexity of manufacturing processes, the volume of data that has to be evaluated rises accordingly. The complexity and data volume make any kind of manual data a...
Peter Benjamin Volk, Martin Hahmann, Dirk Habich, ...
ECR
2006
107views more  ECR 2006»
13 years 8 months ago
Software watermarking via opaque predicates: Implementation, analysis, and attacks
Within the software industry software piracy is a great concern. In this article we address this issue through a prevention technique called software watermarking. Depending on ho...
Ginger Myles, Christian S. Collberg
JAIR
2006
160views more  JAIR 2006»
13 years 8 months ago
Anytime Point-Based Approximations for Large POMDPs
The Partially Observable Markov Decision Process has long been recognized as a rich framework for real-world planning and control problems, especially in robotics. However exact s...
Joelle Pineau, Geoffrey J. Gordon, Sebastian Thrun
PRL
2006
85views more  PRL 2006»
13 years 8 months ago
Image segmentation based on merging of sub-optimal segmentations
In this paper a heuristic segmentation algorithm is presented based on the oversegmentation of an image. The method uses a set of different segmentations of the image produced pre...
Juan Carlos Pichel, David E. Singh, Francisco F. R...