Sciweavers

1993 search results - page 7 / 399
» Analysis of the Effectiveness of G3PARM Algorithm
Sort
View
RECSYS
2009
ACM
14 years 1 months ago
Effective diverse and obfuscated attacks on model-based recommender systems
Robustness analysis research has shown that conventional memory-based recommender systems are very susceptible to malicious profile-injection attacks. A number of attack models h...
Zunping Cheng, Neil Hurley
ISORC
2008
IEEE
14 years 3 months ago
Toward Effective Multi-Capacity Resource Allocation in Distributed Real-Time and Embedded Systems
Effective resource management for distributed real-time embedded (DRE) systems is hard due to their unique characteristics, including (1) constraints in multiple resources and (2)...
Nilabja Roy, John S. Kinnebrew, Nishanth Shankaran...
3DIM
2007
IEEE
14 years 3 months ago
A Comparative Analysis of Depth-Discontinuity and Mixed-Pixel Detection Algorithms
Laser scanner measurements are corrupted by noise and artifacts that can undermine the performance of registration, segmentation, surface reconstruction, recognition, and other al...
Pingbo Tang, Daniel Huber, Burcu Akinci
ICDAR
1999
IEEE
14 years 1 months ago
On the Evaluation of Document Analysis Components by Recall, Precision, and Accuracy
In document analysis, it is common to prove the usefulness of a component by an experimental evaluation. By applying the respective algorithms to a test sample, some effectiveness...
Markus Junker, Andreas Dengel, Rainer Hoch
PPSN
2010
Springer
13 years 6 months ago
More Effective Crossover Operators for the All-Pairs Shortest Path Problem
The all-pairs shortest path problem is the first non-artificial problem for which it was shown that adding crossover can significantly speed up a mutation-only evolutionary algorit...
Benjamin Doerr, Daniel Johannsen, Timo Kötzin...