Sciweavers

5740 search results - page 992 / 1148
» Application of Level Set Methods in Computer Vision
Sort
View
JUCS
2010
141views more  JUCS 2010»
15 years 21 days ago
Trust-Oriented Composite Service Selection with QoS Constraints
Abstract: In Service-Oriented Computing (SOC) environments, service clients interact with service providers for consuming services. From the viewpoint of service clients, the trust...
Lei Li, Yan Wang, Ee-Peng Lim
VLSID
2002
IEEE
177views VLSI» more  VLSID 2002»
16 years 2 months ago
RTL-Datapath Verification using Integer Linear Programming
Satisfiability of complex word-level formulas often arises as a problem in formal verification of hardware designs described at the register transfer level (RTL). Even though most...
Raik Brinkmann, Rolf Drechsler
EUROGP
2009
Springer
132views Optimization» more  EUROGP 2009»
15 years 8 months ago
A Statistical Learning Perspective of Genetic Programming
Code bloat, the excessive increase of code size, is an important issue in Genetic Programming (GP). This paper proposes a theoretical analysis of code bloat in GP from the perspec...
Nur Merve Amil, Nicolas Bredeche, Christian Gagn&e...
SDM
2007
SIAM
204views Data Mining» more  SDM 2007»
15 years 3 months ago
Flexible Anonymization For Privacy Preserving Data Publishing: A Systematic Search Based Approach
k-anonymity is a popular measure of privacy for data publishing: It measures the risk of identity-disclosure of individuals whose personal information are released in the form of ...
Bijit Hore, Ravi Chandra Jammalamadaka, Sharad Meh...
129
Voted
ISMAR
2003
IEEE
15 years 7 months ago
A real-time tracker for markerless augmented reality
Augmented Reality has now progressed to the point where real-time applications are being considered and needed. At the same time it is important that synthetic elements are render...
Andrew I. Comport, Éric Marchand, Fran&cced...