Sciweavers

1814 search results - page 306 / 363
» Improved Results on Geometric Hitting Set Problems
Sort
View
MATA
2004
Springer
149views Communications» more  MATA 2004»
14 years 2 months ago
Detecting and Proving Manipulation Attacks in Mobile Agent Systems
Mobile agents are software entities consisting of code, data and state that can migrate autonomously from host to host executing their code. Unfortunately, security issues restrict...
Oscar Esparza, Miguel Soriano, Jose L. Muño...
ECCV
2010
Springer
14 years 2 months ago
Graph Cut based Inference with Co-occurrence Statistics
Abstract. Markov and Conditional random fields (CRFs) used in computer vision typically model only local interactions between variables, as this is computationally tractable. In t...
GLVLSI
2003
IEEE
132views VLSI» more  GLVLSI 2003»
14 years 2 months ago
Power-aware pipelined multiplier design based on 2-dimensional pipeline gating
Power-awareness indicates the scalability of the system energy with changing conditions and quality requirements. Multipliers are essential elements used in DSP applications and c...
Jia Di, Jiann S. Yuan
ICDAR
2003
IEEE
14 years 2 months ago
Optimizing Binary Feature Vector Similarity Measure using Genetic Algorithm and Handwritten Character Recognition
Classifying an unknown input is a fundamental problem in pattern recognition. A common method is to define a distance metric between patterns and find the most similar pattern i...
Sung-Hyuk Cha, Charles C. Tappert, Sargur N. Sriha...
ICNP
2003
IEEE
14 years 2 months ago
Resilient Peer-to-Peer Streaming
We consider the problem of distributing “live” streaming media content to a potentially large and highly dynamic population of hosts. Peer-to-peer content distribution is attr...
Venkata N. Padmanabhan, Helen J. Wang, Philip A. C...