Sciweavers

927 search results - page 79 / 186
» Detection of Simple Plagiarism in Computer Science Papers
Sort
View
CAD
2004
Springer
15 years 4 months ago
Local topological beautification of reverse engineered models
Boundary representation models reconstructed from 3D range data suffer from various inaccuracies caused by noise in the data and by numerical errors in the model building software...
C. H. Gao, Frank C. Langbein, A. David Marshall, R...
ACSC
2005
IEEE
15 years 10 months ago
A Statistical-driven Approach for Automatic Classification of Events in AFL Video Highlights
Due to the repetitive and lengthy nature, automatic content-based summarization is essential to extract a more compact and interesting representation of sport video. State-of-the ...
Dian Tjondronegoro, Yi-Ping Phoebe Chen, Binh Pham
ENC
2005
IEEE
15 years 10 months ago
Saving Evaluations in Differential Evolution for Constrained Optimization
Generally, evolutionary algorithms require a large number of evaluations of the objective function in order to obtain a good solution. This paper presents a simple approach to sav...
Efrén Mezura-Montes, Carlos A. Coello Coell...
INFOCOM
2012
IEEE
14 years 2 months ago
Expected loss bounds for authentication in constrained channels
We derive bounds on the expected loss for authentication protocols in channels which are constrained due to noisy conditions and communication costs. This is motivated by a numbe...
Christos Dimitrakakis, Aikaterini Mitrokotsa, Serg...
GRID
2006
Springer
15 years 4 months ago
Shibboleth-based Access to and Usage of Grid Resources
Security underpins Grids and e-Research. Without a robust, reliable and simple Grid security infrastructure combined with commonly accepted security practices, large portions of th...
Richard O. Sinnott, Jipu Jiang, J. P. Watt, Oluwaf...