Sciweavers

2620 search results - page 95 / 524
» An Evaluation Technique for Binarization Algorithms
Sort
View
ISCIS
2004
Springer
14 years 1 months ago
Finding Breach Paths Using the Watershed Segmentation Algorithm in Surveillance Wireless Sensor Networks
Considering wireless sensor networks for border surveillance, one of the major concerns is sensing coverage. Breach probability can be used as a measure to analyze the tradeoffs a...
Ertan Onur, Cem Ersoy, Hakan Deliç, Lale Ak...
EUSFLAT
2003
205views Fuzzy Logic» more  EUSFLAT 2003»
13 years 9 months ago
The use of NNPLS algorithm for on-line calibration monitoring
The paper presents a specialised Partial Least Squares (PLS) algorithm for on-line calibration monitoring. At first, the basic scheme and philosophy of PEANO (Process Evaluation a...
Andreas Kirschner
COR
2008
103views more  COR 2008»
13 years 8 months ago
A tabu search algorithm for structural software testing
This paper presents a tabu search metaheuristic algorithm for the automatic generation of structural software tests. It is a novel work since tabu search is applied to the automat...
Eugenia Díaz, Javier Tuya, Raquel Blanco, J...
ECCC
2011
207views ECommerce» more  ECCC 2011»
13 years 2 months ago
Balls and Bins: Smaller Hash Families and Faster Evaluation
A fundamental fact in the analysis of randomized algorithm is that when n balls are hashed into n bins independently and uniformly at random, with high probability each bin contai...
L. Elisa Celis, Omer Reingold, Gil Segev, Udi Wied...
CIKM
2009
Springer
13 years 11 months ago
Provenance query evaluation: what's so special about it?
While provenance has been extensively studied in the literature, the efficient evaluation of provenance queries remains an open problem. Traditional query optimization techniques...
Anastasios Kementsietsidis, Min Wang