Sciweavers

1551 search results - page 6 / 311
» How Typical is the
Sort
View
AMR
2007
Springer
197views Multimedia» more  AMR 2007»
14 years 1 months ago
How to Use SIFT Vectors to Analyze an Image with Database Templates
During last years, local image descriptors have received much attention because of their efficiency for several computer vision tasks such as image retrieval, image comparison, fea...
Adrien Auclair, Laurent D. Cohen, Nicole Vincent
ISCC
2002
IEEE
146views Communications» more  ISCC 2002»
14 years 8 days ago
How bad TCP can perform in mobile ad hoc networks
Several recent studies have indicated that TCP performance degrades significantly in mobile ad hoc networks. This paper examines how bad TCP may perform in such networks and prov...
Zhenghua Fu, Xiaoqiao Meng, Songwu Lu
AVI
2006
13 years 8 months ago
Just how dense are dense graphs in the real world?: a methodological note
This methodological note focuses on the edge density of real world examples of networks. The edge density is a parameter of interest typically when putting up user studies in an e...
Guy Melançon
CPAIOR
2009
Springer
14 years 1 months ago
Learning How to Propagate Using Random Probing
Abstract. In constraint programming there are often many choices regarding the propagation method to be used on the constraints of a problem. However, simple constraint solvers usu...
Efstathios Stamatatos, Kostas Stergiou
CSMR
2008
IEEE
14 years 1 months ago
How Lisp Systems Look Different
Many reverse engineering approaches have been developed to analyze software systems written in different languages like C/C++ or Java. These approaches typically rely on a meta-mo...
Adrian Dozsa, Tudor Gîrba, Radu Marinescu