Sciweavers

1541 search results - page 233 / 309
» Analysis of Random Noise and Random Walk Algorithms
Sort
View
ATAL
2006
Springer
13 years 10 months ago
Mertacor: a successful autonomous trading agent
In this paper we present the internal architecture and bidding mechanisms designed for Mertacor, a successful trading agent, which ended up first in the Classic Trading Agent Comp...
Panos Toulis, Dionisis Kehagias, Pericles A. Mitka...
CGF
2010
218views more  CGF 2010»
13 years 8 months ago
Mesh Snapping: Robust Interactive Mesh Cutting Using Fast Geodesic Curvature Flow
This paper considers the problem of interactively finding the cutting contour to extract components from a given mesh. Some existing methods support cuts of arbitrary shape but re...
Juyong Zhang, Chunlin Wu, Jianfei Cai, Jianmin Zhe...
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
14 years 2 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
ECCV
1992
Springer
14 years 10 months ago
Boundary Detection in Piecewise Homogeneous Textured Images
We address the problem of scale selection in texture analysis. Two di erent scale parameters, feature scale and statistical scale, are dened. Statistical scale is the size of the r...
Stefano Casadei, Sanjoy K. Mitter, Pietro Perona
CAV
2009
Springer
132views Hardware» more  CAV 2009»
14 years 8 months ago
Image Computation for Polynomial Dynamical Systems Using the Bernstein Expansion
This paper is concerned with the problem of computing the image of a set by a polynomial function. Such image computations constitute a crucial component in typical tools for set-b...
Thao Dang, David Salinas