Sciweavers

1466 search results - page 218 / 294
» Completeness of the Authentication Tests
Sort
View
GECCO
2010
Springer
169views Optimization» more  GECCO 2010»
13 years 11 months ago
Robust symbolic regression with affine arithmetic
We use affine arithmetic to improve both the performance and the robustness of genetic programming for symbolic regression. During evolution, we use affine arithmetic to analyze e...
Cassio Pennachin, Moshe Looks, João A. de V...
CVPR
2009
IEEE
13 years 11 months ago
Robust unsupervised segmentation of degraded document images with topic models
Segmentation of document images remains a challenging vision problem. Although document images have a structured layout, capturing enough of it for segmentation can be difficult....
Timothy J. Burns, Jason J. Corso
AAAI
2008
13 years 10 months ago
Dormant Independence
The construction of causal graphs from non-experimental data rests on a set of constraints that the graph structure imposes on all probability distributions compatible with the gr...
Ilya Shpitser, Judea Pearl
AIPS
2007
13 years 10 months ago
The Manpower Allocation Problem with Time Windows and Job-Teaming Constraints
The Manpower Allocation Problem with Time Windows, Job-Teaming Constraints and a limited number of teams (mMAPTWTC) is a crew scheduling problem faced in several different context...
Anders Dohn, Esben Kolind, Jens Clausen
AVI
2008
13 years 10 months ago
Evaluation of pointing performance on screen edges
Pointing on screen edges is a frequent task in our everyday use of computers. Screen edges can help stop cursor movements, requiring less precise movements from the user. Thus, po...
Caroline Appert, Olivier Chapuis, Michel Beaudouin...