Sciweavers

4498 search results - page 19 / 900
» How to Invent Functions
Sort
View
ECCV
2010
Springer
14 years 18 days ago
What, Where & How Many? Combining Object Detectors and CRFs
Abstract. Computer vision algorithms for individual tasks such as object recognition, detection and segmentation have shown impressive results in the recent past. The next challeng...
PKC
1999
Springer
102views Cryptology» more  PKC 1999»
13 years 11 months ago
How to Enhance the Security of Public-Key Encryption at Minimum Cost
This paper presents a simple and efficient conversion from a semantically secure public-key encryption scheme against passive adversaries to a non-malleable (or semantically secure...
Eiichiro Fujisaki, Tatsuaki Okamoto
GECCO
2006
Springer
134views Optimization» more  GECCO 2006»
13 years 11 months ago
PSO and multi-funnel landscapes: how cooperation might limit exploration
Particle Swarm Optimization (PSO) is a population-based optimization method in which search points employ a cooperative strategy to move toward one another. In this paper we show ...
Andrew M. Sutton, Darrell Whitley, Monte Lunacek, ...
FPCA
1995
13 years 11 months ago
How Much Non-Strictness do Lenient Programs Require?
Lenient languages, such as Id90, have been touted as among the best functional languages for massively parallel machines AHN88]. Lenient evaluation combines non-strict semantics w...
Klaus E. Schauser, Seth Copen Goldstein
EH
2004
IEEE
106views Hardware» more  EH 2004»
13 years 11 months ago
How to Evolve the Head-Tail Pattern from Reaction-Diffusion Systems
The possible application of evolving artificial embryos to build functional machinery is a promising area of research. Unfortunately, there are still many fundamental problems to ...
Felix Streichert, Christian Spieth, Holger Ulmer, ...