Sciweavers

1380 search results - page 140 / 276
» Computing the optimal strategy to commit to
Sort
View
DSN
2009
IEEE
13 years 5 months ago
RRE: A game-theoretic intrusion Response and Recovery Engine
Preserving the availability and integrity of networked computing systems in the face of fast-spreading intrusions requires advances not only in detection algorithms, but also in a...
Saman A. Zonouz, Himanshu Khurana, William H. Sand...
AMDO
2010
Springer
13 years 4 months ago
Analysing the Influence of Vertex Clustering on PCA-Based Dynamic Mesh Compression
Abstract. The growth of computational power of contemporary hardware causes technologies working with 3D-data to expand. Examples of the use of this kind of data can be found in ge...
Jan Rus, Libor Vása
VECPAR
2004
Springer
14 years 1 months ago
Message Strip-Mining Heuristics for High Speed Networks
In this work we investigate how the compiler technique of message strip mining performs in practice on contemporary high performance networks. Message strip mining attempts to redu...
Costin Iancu, Parry Husbands, Wei Chen
GECCO
2006
Springer
179views Optimization» more  GECCO 2006»
13 years 11 months ago
Parisian evolution with honeybees for three-dimensional reconstruction
This paper introduces a novel analogy with the way in which honeybee colonies operate in order to solve the problem of sparse and quasi dense reconstruction. To successfully solve...
Gustavo Olague, Cesar Puente
ICCV
2009
IEEE
13 years 5 months ago
Face alignment through subspace constrained mean-shifts
Deformable model fitting has been actively pursued in the computer vision community for over a decade. As a result, numerous approaches have been proposed with varying degrees of ...
Jason M. Saragih, Simon Lucey, Jeffrey F. Cohn