Sciweavers

2905 search results - page 195 / 581
» Formal Memetic Algorithms
Sort
View
ECCV
2004
Springer
14 years 3 months ago
A Fourier Theory for Cast Shadows
—Cast shadows can be significant in many computer vision applications, such as lighting-insensitive recognition and surface reconstruction. Nevertheless, most algorithms neglect ...
Ravi Ramamoorthi, Melissa L. Koudelka, Peter N. Be...
GC
2004
Springer
14 years 3 months ago
Verifying a Structured Peer-to-Peer Overlay Network: The Static Case
Abstract. Structured peer-to-peer overlay networks are a class of algorithms that provide efficient message routing for distributed applications using a sparsely connected communic...
Johannes Borgström, Uwe Nestmann, Luc Onana A...
GROUP
2003
ACM
14 years 3 months ago
Supporting activity-centric collaboration through peer-to-peer shared objects
We describe a new collaborative technology that is mid-way between the informality of email and the formality of shared workspaces. Email and other ad hoc collaboration systems ar...
Werner Geyer, Jürgen Vogel, Li-Te Cheng, Mich...
SASN
2003
ACM
14 years 3 months ago
Modeling vulnerabilities of ad hoc routing protocols
The purpose of this work is to automate the analysis of ad hoc routing protocols in the presence of attackers. To this end, a formal model of protocol behavior is developed in whi...
Shahan Yang, John S. Baras
CAV
2003
Springer
140views Hardware» more  CAV 2003»
14 years 3 months ago
Certifying Optimality of State Estimation Programs
Abstract. The theme of this paper is certifying software for state estimation of dynamic systems, which is an important problem found in spacecraft, aircraft, geophysical, and in m...
Grigore Rosu, Ram Prasad Venkatesan, Jon Whittle, ...