Sciweavers

1663 search results - page 122 / 333
» Computer Security in the Real World
Sort
View
146
Voted
EUSFLAT
2001
15 years 4 months ago
Fuzzy robustness analysis
This paper proposes a confluence between soft OR and soft computing methods, by means of an application of fuzzy logic ideas to robustness analysis. Both methods try to add flexib...
Luiz Fernando Loureiro Legey, Heloisa Firmo Kazay
125
Voted
BIRTHDAY
2010
Springer
15 years 4 months ago
Metrization Theorem for Space-Times: From Urysohn's Problem towards Physically Useful Constructive Mathematics
In the early 1920s, Pavel Urysohn proved his famous lemma (sometimes referred to as "first non-trivial result of point set topology"). Among other applications, this lemm...
Vladik Kreinovich
138
Voted
ICPR
2010
IEEE
15 years 1 months ago
A Novel Multi-view Agglomerative Clustering Algorithm Based on Ensemble of Partitions on Different Views
In this paper, we propose a new algorithm for extending the hierarchical clustering methods and introduce a Multi-View Agglomerative Clustering approach to handle multi-view repre...
Hamidreza Mirzaei
138
Voted
ICCV
2009
IEEE
15 years 1 months ago
Non-rigid object localization and segmentation using eigenspace representation
This paper presents a novel non-rigid object localization and segmentation algorithm using an eigenspace representation. Previous approaches to eigenspace methods for object track...
Omar Arif, Patricio A. Vela
124
Voted
ATAL
2005
Springer
15 years 9 months ago
The use of emotions to create believable agents in a virtual environment
In the past emotions have been dismissed as a distraction to the logical, scientific thought process. More recently however, the importance of emotion in human-like intelligence a...
Karthi Selvarajah, Debbie Richards