Sciweavers

5740 search results - page 1025 / 1148
» Application of Level Set Methods in Computer Vision
Sort
View
JEI
2008
128views more  JEI 2008»
13 years 8 months ago
Practical use of receiver operating characteristic analysis to assess the performances of defect detection algorithms
Defect detection in images is a current task in quality control and is often integrated in partially or fully automated systems. Assessing the performances of defect detection algo...
Yann Le Meur, Jean-Michel Vignolle, Jocelyn Chanus...
PVLDB
2008
118views more  PVLDB 2008»
13 years 8 months ago
Efficient top-k processing over query-dependent functions
We study the efficient evaluation of top-k queries over data items, where the score of each item is dynamically computed by applying an item-specific function whose parameter valu...
Lin Guo, Sihem Amer-Yahia, Raghu Ramakrishnan, Jay...
MIDDLEWARE
2007
Springer
14 years 3 months ago
Fair access to scarce resources in ad-hoc grids using an economic-based approach
In ad-hoc Grids where the availability of resources and tasks changes over the time, distributing the tasks among the scarce resources in a balanced way is a challenging task. In ...
Behnaz Pourebrahimi, Koen Bertels
DOCENG
2004
ACM
14 years 2 months ago
Page composition using PPML as a link-editing script
The advantages of a COG (Component Object Graphic) approach to the composition of PDF pages have been set out in a previous paper [1]. However, if pages are to be composed in this...
Steven R. Bagley, David F. Brailsford
IWCMC
2006
ACM
14 years 3 months ago
TARP: trust-aware routing protocol
Security is a critical issue in a mobile ad hoc network (MANET). In most of the previous protocols security is an added layer above the routing protocol. We propose a TrustAware R...
Loay Abusalah, Ashfaq A. Khokhar, G. BenBrahim, W....
« Prev « First page 1025 / 1148 Last » Next »